Cybersecurity Architecture - Technical Arts, Media & Design Jobs - Idaho Falls, ID at Geebo

Cybersecurity Architecture - Technical

The Department of Homeland Security (DHS) is recruiting professionals to support a range of technical roles in Cybersecurity Architecture, including Identity and Access Management (IAM) Expert, Data Management and Governance Analyst, Data Architect, Cybersecurity Engineer, Systems Engineer, and Cybersecurity Supply Chain Risk Management (SCRM) ArchitectAll positions are in the DHS Cybersecurity Service.
There are a variety of Cybersecurity Architecture opportunities across the Department, including supporting several specialized programs at the DHS Office of Strategy, Policy, and Plans (PLCY), Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and Federal Emergency Management Agency (FEMA) Depending on your career level and role, DHS Cybersecurity Service employees in the Technical Career Track, with a technical capability in Cybersecurity Architecture, will generally apply their expertise to perform a range of tasks, including:
Serving as a technical advisor and consultant to colleagues and/or DHS leadership on the implementation of the Department's information systems security policy and guidelines.
Assisting DHS leadership in making integration decisions, analyzing design constraints and trade-offs in system and security design, and ensuring integrity of DHS mission objectives, while protecting DHS assets from cyber threats and vulnerabilities.
Advocating for, influencing and/or defending policy and program decisions among Department leaders and high-ranking officials across government and develop novel solutions that impact matters of national significance related to the DHS Cybersecurity mission.
Collaborating with internal and external DHS stakeholders and national experts to budget for, architect, and design enterprise cybersecurity solutions.
Reviewing security and privacy requirements to isolate system needs and translating those requirements into secure technical and operational specifications.
Conducting and evaluating design reviews and conducting security risk assessments, gap analyses, and business impact analyses to detect system weaknesses, identify the depth and breadth of needed security controls, and make targeted recommendations to address issues and mitigate risks.
Designing and evaluating networks that are secure from known and perceived methods of cyber-attack on all elements including but not limited to wired and wireless elements, Cloud-based, and virtual environments incorporating secure controls.
Establishing defense in-depth mechanisms to detect, deflect or mitigate cyber-attacks on networks and communications systems and structures.
Designing and evaluating software that is secure from known and perceived methods of cyber-attack and analyzing software risks, understanding likely points of attack, and determining how software will mitigate potential attacks.
Conducting secure code review in accordance with software assurance best practices.
Assessing systemic threats in deployment environment and vulnerabilities of application and identifying application vulnerabilities, taking into consideration security controls, recovery strategies, contingency plans, and testing and evaluation.
Executing and/or assisting development based on secure design specifications, utilizing secure tools and methodologies.
Tracking and correcting system defects through testing and implementation phases.
Providing oversight of systems testing and evaluation and test case development and mapping.
Developing objectives and criteria for testing program.
Establishing testing frameworks and contingency plans.
DHS Cybersecurity Service employees start at career levels and salaries matching their experience and expertiseIn recruiting for this opportunity, DHS may hire employees at higher or lower career levels and associated salariesThis position is in the Technical Track across a range of career levelsEmployees in this career track generally:
Have between 5-15 years of cybersecurity work experience.
Range from experienced cybersecurity professionals who apply technical expertise and independent judgement to perform cybersecurity work - to - recognized Federal cybersecurity technical authorities with uncommon technical expertise who advise on cybersecurity challenges impacting DHS and the Nation.
DHS Cybersecurity Service employees with a technical capability in Cybersecurity Architecture will generally apply their expertise to:
Develop system concepts and work on the capabilities phases of the systems development lifecycle Translate technology and environmental conditions (e.
g.
, laws, regulations, policies and technical standards) into system and security designs and processes.
Provide recommendations for investment standards and policies that drive how controls will be applied across the organization DHS Cybersecurity Service employees start at career levels and salaries matching their experience and expertiseTo learn more about DHS Cybersecurity Service career tracks and levels, visit our application portal.
This position is focused on Cybersecurity Architecture.
DHS Cybersecurity Service jobs are structured cybersecurity specializations - called technical capabilitiesTo learn more about technical capabilities, visit our application portal.
Recommended Skills Architecture Coaching And Mentoring Computer Security Leadership Strategic Thinking System Development Apply to this job.
Think you're the perfect candidate? Apply on company site Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.