Rividium
Information Systems Security Developer - Intermediate - SP-SYS-001-2 (NCR)
Rividium, Des Moines, Iowa, United States,
Job Title:
Information Systems Security Developer - IntermediateLocation:
Saint Louis, MissouriExperience Level:
IntermediateClearance:
TOP SECRET/SCIWork Role Description:
Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.Tasks:Analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support.Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications.Assess the effectiveness of cybersecurity measures utilized by system(s).Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile.Build, test, and modify product prototypes using working models or theoretical models.Conduct Privacy Impact Assessments (PIAs) of the application’s security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII).Design and develop cybersecurity or cybersecurity-enabled products.Design hardware, operating systems, and software applications to adequately address cybersecurity requirements.Design or integrate appropriate data backup capabilities into overall system designs, and ensure that appropriate technical and procedural processes exist for secure system backups and protected storage of backup data.Develop and direct system testing and validation procedures and documentation.Develop detailed security design documentation for component and interface specifications to support system design and development.Develop Disaster Recovery and Continuity of Operations plans for systems under development and ensure testing prior to systems entering a production environment.Develop risk mitigation strategies to resolve vulnerabilities and recommend security changes to system or system components as needed.Develop specific cybersecurity countermeasures and risk mitigation strategies for systems and/or applications.Identify components or elements, allocate security functions to those elements, and describe the relationships between the elements.Abilities:Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).Ability to ask clarifying questions.Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.Ability to produce technical documentation.Ability to analyze test data.Ability to translate data and test results into evaluative conclusions.Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).Ability to apply secure system design tools, methods and techniques.Ability to apply system design tools, methods, and techniques, including automated systems analysis and design tools.Ability to ensure security practices are followed throughout the acquisition process.Ability to design architectures and frameworks.Ability to collaborate effectively with others.Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.Ability to participate as a member of planning teams, coordination groups, and task forces as necessary.Ability to understand objectives and effects.Ability to understand the basic concepts and issues related to cyber and its organizational impact.Education:Bachelor degree or higher from an accredited college or university. Prefer an accredited Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field.Certification Requirement(s) (e.g., DoD 8570.01-M):IAT, IAM, or IASAE Level 3
#J-18808-Ljbffr
Information Systems Security Developer - IntermediateLocation:
Saint Louis, MissouriExperience Level:
IntermediateClearance:
TOP SECRET/SCIWork Role Description:
Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.Tasks:Analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support.Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications.Assess the effectiveness of cybersecurity measures utilized by system(s).Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile.Build, test, and modify product prototypes using working models or theoretical models.Conduct Privacy Impact Assessments (PIAs) of the application’s security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII).Design and develop cybersecurity or cybersecurity-enabled products.Design hardware, operating systems, and software applications to adequately address cybersecurity requirements.Design or integrate appropriate data backup capabilities into overall system designs, and ensure that appropriate technical and procedural processes exist for secure system backups and protected storage of backup data.Develop and direct system testing and validation procedures and documentation.Develop detailed security design documentation for component and interface specifications to support system design and development.Develop Disaster Recovery and Continuity of Operations plans for systems under development and ensure testing prior to systems entering a production environment.Develop risk mitigation strategies to resolve vulnerabilities and recommend security changes to system or system components as needed.Develop specific cybersecurity countermeasures and risk mitigation strategies for systems and/or applications.Identify components or elements, allocate security functions to those elements, and describe the relationships between the elements.Abilities:Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).Ability to ask clarifying questions.Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.Ability to produce technical documentation.Ability to analyze test data.Ability to translate data and test results into evaluative conclusions.Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).Ability to apply secure system design tools, methods and techniques.Ability to apply system design tools, methods, and techniques, including automated systems analysis and design tools.Ability to ensure security practices are followed throughout the acquisition process.Ability to design architectures and frameworks.Ability to collaborate effectively with others.Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.Ability to participate as a member of planning teams, coordination groups, and task forces as necessary.Ability to understand objectives and effects.Ability to understand the basic concepts and issues related to cyber and its organizational impact.Education:Bachelor degree or higher from an accredited college or university. Prefer an accredited Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field.Certification Requirement(s) (e.g., DoD 8570.01-M):IAT, IAM, or IASAE Level 3
#J-18808-Ljbffr