Position is contingent upon contract award. If you are seeking a position with a strong team, focused on doing great things every day, with the opportunity to sell a wide array of technological solutions from the desktop to the data center, then join our team at ATS! We are looking for talented, creative individuals to help our customers solve problems. Applied Technology Services (ATS) is an IT systems integrator and has been a trusted partner to customers in the Mid-Atlantic region for 20 years. We have core competencies in Enterprise Modernization, Infrastructure Services, End User Computing, Workforce Optimization, Cyber Security Solutions, and IT Staffing. ATS provides a wide array of professional and managed services from the data center to the desktop. ATS holds minority certifications in Delaware, Maryland, the District of Columbia, Pennsylvania, and Virginia and is a Third-Party Certified Women Owned Small Business (WOSB). T h e M ana g e r of C y b e r S e cu ri t y Se rvi ce s (CSS ) w ill be han ds - on an d r e spo n s i ble f or mana g emen t ofi nf or ma t ion s ecu ri t y an d c o m pli anc e r e l a t e d ac t iv i t i e s i nc l u di n g t h e f o l lo w i n g:
U t ilizi n g a ris k - b a s e d a p p ro ac h t o mana ge i nf or m a t ion s ecu ri t y r e l a t e d a s p ec t s of o p e r a t io n s.
Ass u ri n g c o m pli anc e w i t h i nf or ma t ion s ecu ri t y, pr i v ac y, an d i n d u s t ry s t an d a rds an d r e g u l a t i o n s.
De sig n i n g, e s t a blis h i n g , an d ma i n t a i n i n g r ea so n a ble org an iz a t i o na l c yb e r s ecu ri t y an d i nf or ma t ion priv ac y po s t u r e s.
Im pl emen t i n g t h e NIS T C yb e rs ecu ri t y Fr amew ork w i t h in t h e org an i z a t ion t o i m prove c y b e r r e sili ence .
I n c oordi na t ion w i t h k e y s t a k eh old e rs, t h is p osi t i o n c o mmun i ca t e s, pr e p a r e s f or, an d r e s p o n ds t o g e opoli t i ca l, i n t e r na t io na l, an d na t io na l c y b e r t h r e a t s f rom a n A g enc y p e rs p ec tiv e .
T h is role is r e spo n sible f or en s u ri n g sys t e m s a re s ecu r e , a re c o m pli an t a s p e r e s t a blis he d r e g u l a t ory f r amew orks, a n d au di t e d a s p e r e s t a bl i s he d ca d ence .
E ss e n t i a l J o b F u n c t i o n s:
(Du t i e s lis t e d a re n o t i n t en d e d t o be a ll i nc l u sive n or t o li m i t d u t i e s t ha t m ig h t r ea so na bly be a ss ig ne d.)
Works w i t h CI O/ C T O t o d ef i ne , i m pl emen t an d ma i n t a in c orpor a t e i nf o r ma t ion an d o p e r a t io n s t echn ology s ecu ri t y p oli c i e s, pro ce d u r e s, an d g u i d e li ne s b a s e d on i n d u s t r y b e st pr ac t i ce s t ha t a re c o m pli an t w i t h fe d e r a l a n d s t a t e r e g u l a t io n s .
M a i n t a i n i n g awa r ene ss of ne w c yb e r t h r ea t s, v u l ne r a bili t i e s, an d t echn ologi e s t o k ee p t h e org an iz a t ion s ecu r e .
C o n d uc t i n g risk a ss e ss m en t s t o i d en t i f y po t en t i a l s ecu ri t y t h r ea t s an d v u l n e r a bili t i e s.
Mo n i t ori n g ne t w ork ac t i v i t y t o id en t i f y sig n s of i n t r u sion or c o m pro m is e .
P rovidi n g t echn i ca l s u p p ort f or c o m p u t e r ne t w o rks, i nc l u di n g f ir ewa lls, op e r a t i n g s ys t em s an d a ppli ca t io n s, p a t c h man a g emen t , an d d a t a s ecu ri t y b e st pr ac ti ce s.
M ana ges ecu ri t y t ool s u i t e in i nc l u di n g en dpoi n t pro t ec t io n , v u l ne r a bili t y a ss e ss men t , log a ggr e g a t ion an d ana lysi s .
T r a i n i n g s t af f in i nf or ma t ion s ecu ri t y b e st pr ac t i c e s t o en s u re c o m pli anc e w i t h c o m p an y po l i c i e s.
C o n d uc t i n g au di t s t o en s u re s ecu ri t y pro t o c o l s a r e b e i n g f ollo we d by s t aff.
P rovidi n g t r a i n i n g in i nf o r ma t ion s ecu ri t y b e st pr a c t i ce s t o em ploy ee s.
Worki n g k n o w l e dge w i t h i n d u s t ry s t an d a r d s s uc h a s H I P AA, I T I L , NIS T , S A NS , C O BI T , OWA S P , an d IS O.
O w n t h e en t ire I T au d i t pro ce ss f or S OC & P C I r e por t i n g ac ross t h e en t e r p ris e .
R e spo n sible f or l ea di n g v u l ne r a bili t y au di t s , f or en s ic i n v e s t ig a t io n s , an d m it ig a t ion pro ce d u r e s.
R e spo n ds i mme di a t e ly t o s ecu ri t y - r e l a t e d i nc id en t s, l ea ds r e spo n se t eam , an d prov i d e s p o s t - event analysis.
Evaluate new cybersecurity threats and IT trends and develop effective security controls.
Evaluate potential security breaches, coordinate response, and recommend corrective actions.
Monitor compliance with security policies and procedures.
Investigate security breaches and incidents.
Coordinate incident response activities.
Train and educate employees on security awareness.
Manage security vendors and service providers.
Take proactive role in procurement process from the cyber security perspective.
Manage department budget, take part in annual capital expenditures planning exercises.
Manage records created and received in compliance with the Hampton Roads Transit Records Management Policy and Procedures.
R e q u i r e d K n o w l e d g e , Ab ili t ie s a nd Sk i l l s e s s e n t i a l t o J ob F u n c t i o n s :
Bache lor ’ s d e gr e e in c o m p u t e r s c i ence , i nf or ma t i o n t echn ology, or r e l a t e d f i e ld.
10 + y ea rs of e x p e ri enc e in I T s ecu ri t y, i nc l u di n g 5 + y ea rs in a mana g emen t or l ea d r o l e .
Ce r t i f i e d Inf or ma t ion Se c u ri t y M ana g e r (CIS M ) , C e r t i f i e d Inf or ma t ion S ys t e m s Secu ri t y P ro fe ssio nal (CISS P ) Ce r t i f i ca t ion or s i m il a r ce r t i f i ca t io n .
E x p e ri enc e w i t h a div e r s e body of t echn i ca l c yb e r t ools an d so f t wa r e .
In- d e p t h k n o w l e dge of c yb e r s ecu ri t y pri nc ipl e s a n d b e st pr ac ti ce s.
E x p e ri enc e d e v e lopi n g a n d i m pl emen t i n g s ecu ri t y poli c i e s an d pro ce d u r e s.
Dem o n s t r a t e d E x p e ri enc e in Ne t w ork E n gi nee ri n g.
P roj ec t mana g emen t e x p e ri ence .
Ce r t i f i ca t ion in C o m p T I A Secu ri t y+.
Abili t y t o effec t iv e ly pr e s e n t i nf or ma t ion an d r e sp o n d t o q ue s t io n s f rom s en i or mana g emen t , gro u ps of mana g e rs, c li en t s, an d i n t e r na l an d ex t e r na l c u s t o me rs.
Abili t y t o han dle mu l t iple t a sks si mu l t ane o u sly a n d mee t mu l t i ple d ea dli ne s.
Ex ce ll en t w ri t t e n an d v e r b a l c o mmun i ca t ion skill s .
R e q u i r e d S o f t wa r e K n o w l e d g e a nd Sk i l l s e s s e n t i al t o J o b F u n c t i o n s :
P ro f i c i enc y in u si n g c o m p u t e r sys t em s an d t h e list e d s o f t wa re a ppli ca t io n s a s so c i a t e d w i t h p e r f or manc e of a ssig ne d w ork is e ss en t i a l. Ba sic probl em- solvi n g skills a sso c i a t e d w i t h s o f t wa re a ppli ca t io n s u s e d is e x p ec t e d. S o f t wa re u s a g e r e l e v an t t o j ob d u t i e s w ill be e v a l ua t e d .
S o f t wa re a ppli ca t io n s :
S t ro n g b ac k gro un d in W i n do w s s ecu ri t y mana g e men t an d s ecu ri t y a r ch i t ec t u r e .
Bac kgro un d in a p pli ca t i o n s ecu ri t y ana lysis, d e si g n , an d t e s t i n g.
E x p e ri enc e in ne t w ork t r aff ic f low m o n i t ori n g an d ana lysis t o ols.
E x p e ri enc e in log a ggr e g a t ion an d ana lysis t ools.
E x p e ri enc e w i t h v u l ne r a bili t y a ss e ss men t t ools.
E x p e ri enc e w i t h en dpoi n t pro t ec tion t o ols.
E x p e ri enc e w i t h In t e r ne t of T h i n gs / O p e r a t io na l T echn ology s ecu ri t y.
E x p e ri enc e w i t h a div e r s e s u i t e of c yb e r an d ne t w ork t ool s .
E x p e ri enc e w i t h p h ysi ca l s ecu ri t y acce ss c o n t rol s ys t em s an d vid e o s u rv e il l anc e sys t em s.
S af e t y R e s p o n s i b i li t y:
P e r f orm a ll job d u t i e s a n d r e s p o n sibili t i e s in a s af e manne r t o pro t ec t oneself, fe llow em ploy ee s, an d t h e p u blic f rom i n j u ry or ha r m . P ro m o t e s afe t y awa r ene ss an d f ollow s afe t y p r o c e d ure s an d p o li c i e s . T a k e a n ac t ive p a rt in r e p or t i n g un s af e c o n di t io n s an d an y ha z a rds w i t h in t h e w orkpl ac e t o t he ir Su p e rv i sor, M ana g e r an d/or t h e Saf e t y De p a r t men t .
Full-Time Employee Benefits:
Competitive compensation
Health benefits including Medical, Dental and Vision
Vacation and Personal Days
401K
Employee Assistance Plan
Continuous education and learning opportunities.
Powered by JazzHR