What are the responsibilities and job description for the Lead Cybersecurity Analyst for C5ISR Operations position at Bollinger Shipyards?
General Function :
The Lead Cybersecurity Analyst for C5ISR Operations is responsible for managing all aspects of cybersecurity operations for C5ISR systems. This pivotal role involves ensuring compliance with quality standards, managing risks, responding to incidents, and collaborating with military and defense stakeholders to protect sensitive systems and data. The position offers an opportunity for leadership in cybersecurity operations, policy implementation, and mentorship of junior staff.
Key Responsibilities :
- Lead Cybersecurity Operations : Oversee cybersecurity efforts, including risk assessments, vulnerability management, incident response, and threat analysis for C5ISR systems.
- Develop and Implement Security Strategies : Create, enforce, and monitor comprehensive security policies and procedures that align with industry standards and government regulations.
- C5ISR System Security : Ensure the secure operation of C5ISR platforms, networks, and communication systems, collaborating closely with military and defense personnel.
- Incident Response Management : Spearhead investigations and resolve security breaches, coordinating with cross-functional teams to mitigate threats and reduce downtime.
- Risk Assessment and Management : Identify and manage cybersecurity risks specific to C5ISR systems, developing strategies to protect critical data and infrastructure.
- Collaboration and Communication : Work alongside various departments, contractors, and military personnel to ensure integrated cybersecurity measures across all C5ISR systems.
- Security Audits and Compliance : Conduct regular security audits, ensure adherence to DoD regulations, and prepare for external security assessments.
- Training and Mentorship : Provide guidance and training to junior cybersecurity staff, keeping them informed of the latest defense techniques and technologies.
- Documentation and Reporting : Maintain detailed records of security protocols, incidents, and vulnerabilities. Prepare comprehensive reports for senior leadership and stakeholders.
Required Knowledge, Skills, and Abilities :