Alion's Information Assurance - Forensic Analysts supports US SOUTHERN COMMAND's Information Assurance/Cyber Security team in Doral, FL. Our IA Forensic Analyst position is ideal for individuals who are both tech savvy and have a desire to analyze and investigate cyber security capability and incidents. We support US SOUTHCOM's Operational Mission on a 24/7 basis with some of the worlds most advance IT systems and architectures.
Duties and Responsibilites are:
- Determines enterprise information assurance and security standards.
- Develops and implements information assurance/security standards and procedures.
- Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customers’ requirement
- Identifies, reports, and resolves security violations.
- Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.
- Supports customers at the highest levels in the development and implementation of doctrine and policies.
- Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and p
- Performs analysis, design, and development of security features for system architectures.
- Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers.
- Designs, develops, engineers, and implements solutions that meet security requirements.
- Provides integration and implementation of the computer system security solution.
- Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.
- Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
- Ensures that all information systems are functional and secure.
- Performs basic vulnerability scans using vendor utility tools. Monitors security audit and intrusion detection system logs for system and network anomalies.
- Investigates and/or escalates security violations, attempts to gain unauthorized access, virus infections that may affect the network or other event affecting security.
- Assists in providing engineering analysis, design and support for firewalls, routers, networks and operating systems.
- Assists in performing product evaluations and recommends products/services for network security.
- Validates and tests basic security architecture and design solutions to produce detailed engineering specifications with recommended vendor techniques.
- Develops, tests and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools.
- Assists in the review and recommends the installation, modification or replacement of hardware or software components and any configuration changes that affect sec
- Assists in providing oversight and enforcement of security directives, orders, standards, plans and procedures at server sites.
- Experience working with internet, web, application and network security techniques.
- Experience working with relevant operating system security.
- Experience working with leading firewall, network scanning and intrusion detection products and authentication technologies.
- Experience working with federal regulations related to information security.
- Experience working with NIST Special Publications and C&A process methodology.
Security Clearance: Top Secret/Sensitive Comp Info