The Contractor shall perform activities that include, but are not limited to the following:
• enforce department and industry standards, guidelines, and policies for securing windows servers ensuring they have been appropriately applied and configured across all OBO/IRM IT infrastructure (on-Prem and in-Cloud)
• enforce department and industry standards, guidelines, and policies for securing Active Directory (AD) objects across all OBO/IRM IT infrastructure (on-Prem and in-Cloud)
• Provide support for administering and managing the structure of the bureau’s OU security groups and distribution lists
• utilize Department Security Incident and Event Management tools (NetIQ Sentinel, Tenable Nessus, Splunk, and Change Auditor, McAfee Policy Auditor) or the contractor will be required to deploy SIEM tools to conduct daily monitoring, detection, and event log analysis and alerting looking for unauthorized activities across the IT infrastructure
• coordinate and conduct application, windows server, and database vulnerability and compliance scans across all infrastructures
• conduct audit exercises across all environments
• ensure the Information Security section of OBO’s contract language (specifically Section H) sufficiently addresses Federal and Department Cyber Security regulations, guidelines, and procedures for protecting SBU and/or CUI (Controlled Unclassified Information) information at OBO’s Design and Construction contractor sites.
• ensure updates to the Information Security section of the contract is updated semi-annually or whenever there is a major change or advancement in Cyber Security policy.
• establish a program for the analysis/evaluation of new technologies proposed by these contract firms to ensure their compliance with existing Cyber Security/Information Security policy.
• Create features and user stories using the SAFe Agile framework within Azure DevOPS
• Coach and guide the team through execution of Agile (SAFe) practices and remove impediments that hinder project progress.
• Lead the Division level DevSecOPS Policies and procedures.
REQUIREMENTS:
- Must possess an active top-secret clearance
- Five (5) years of progressive experience in technical experience conducting network, system and application vulnerability and risk assessments, and developing risk mitigation strategies.
- Strong problem solving and resolution skills.
- Comprehensive knowledge of secure implementation principles for firewalls, routers, switches, hubs, proxy servers, and security servers.
- Must possess a Bachelor Degree cybersecurity, computer science, informational technology, or related fields; Additional (4) four years of experience may be substituted for a degree.