What are the responsibilities and job description for the Security Architect position at ANALYGENCE, Inc?
Exciting opportunities at ANALYGENCE! Meet our recruiting team on March 27 & 28 11-2pm at the TransitionCareers Lackland AFB - Defense, Space, IT, Cyber & Intel Hiring Fair in San Antonio, TX. Register to attend through Transition Careers: https://transitioncareers.com/event/lackland/.
The Air Combat Command's 67th Cyberspace Wing (67 CW), 346th Cyber Test and Evaluation Squadron (346 CTES), executes, and contributes as both an operational and participating test organization in a full array of operational tests of various cyber weapons in coordination with the 318 Range Squadron (318RANS) who provides instrumented cyber range services, through both physical hardware and virtual systems.
In support of this mission, ANALYGENCE is seeking Security Architects to join our team. In this role you will be responsible for performing security audits, risk assessments and analyses with adherence to DISA STIGs, NIST, and industry best practices; duties to include vulnerability and compliance inspections to include, but not limited to scanning the network to identify active devices, fingerprint applications, operating systems and databases, identifying vulnerabilities, analyzing the results, manually verifying findings to eliminate false positives or negatives, capturing artifacts such as screen captures, etc., to provide evidence for each exploitable vulnerability, etc. Candidate must also be able to adequately “tell the story” of how the vulnerability was exploited and what the overall impact would be to particular hosts or networks.
Duties:
- Conduct vulnerability and compliance assessments on AF and DoD systems (i.e., Microsoft Windows and UNIX based platforms) and databases (i.e., MS SQL Server, Oracle, PostgreSQL, MySQL (Maria DB), Mongo DB, Sybase, IBM DB2, SQLite, FireBird, and Informix)
- Demonstrated ability to methodically analyze problems and identify potential solutions.
- Ability to adequately explain, present, demonstrate [when applicable] and document the operational impact of a particular vulnerability or exploit.
- Analyze and evaluate database schemas and current or proposed configurations to discern weaknesses for exploitation and supply recommendations for enhancing database internal and external security; document and transition results in reports, presentations, and technical exchanges.
- Knowledgeable in common cyber threat terminology, methodologies, possess basic understanding of cyber incident and response, and related current events.
- Craft recommendations for customer to prevent/mitigate attempted breaches of database security and database security weaknesses
- Render guidance on formulating security policies, procedures, along with tactics, techniques and procedures to enhance data and database protections.
- Possess good writing and communications skills, with an attention to detail and desire to deliver a quality product; additionally, an ability to render concise reports, summaries, and formal oral presentations.
- Position requires travel up to 25%.