What are the responsibilities and job description for the Information Security Risk Mitigation Analyst position at UIC Alaska?
About the Role:
As a Cybersecurity Analyst at UIC Alaska, you will be responsible for ensuring that our fleet and land-based configurations comply with Department of Defense (DOD) cybersecurity policies.
Main Responsibilities:
- Conduct vulnerability scans and identify vulnerabilities in security systems.
- Use DoD network analysis tools to assess vulnerabilities.
- Perform application vulnerability assessments.
- Identify systemic security issues based on vulnerability and configuration data analysis.
- Share insights to improve the organization's risk management posture.
- Apply cybersecurity and privacy principles to organizational requirements.
- Troubleshoot and diagnose cyber defense infrastructure anomalies.
- Perform impact/risk assessments.
Required Skills:
- Conducting vulnerability scans and recognizing vulnerabilities in security systems.
- Using DoD network analysis tools to identify vulnerabilities.
- Skill in system, network, and OS hardening techniques.
- Conducting vulnerability assessments.
- Ability to identify systemic security issues based on vulnerability and configuration data analysis.
- Ability to apply cybersecurity and privacy principles to organizational requirements.
- Applying host/network access controls.
- Using Virtual Private Network (VPN) devices and encryption.
- Protecting networks against malware.
- Troubleshooting and diagnosing cyber defense infrastructure anomalies.
- Performing impact/risk assessments.
Qualifications:
- DoDM 8140.03 certification (any IAT level 2 certification will meet requirement).
- Seven (7) years of professional experience as a Cybersecurity Specialist with a specialization in cross-domain solution implementation.
- Five years of computer networking concepts and protocols, and network security methodologies experience.
- Knowledge of network security architecture concepts.
- Experience working with Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
- Experience working with network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
- Knowledge of application vulnerabilities.
- Knowledge of system administration, network, and operating system hardening techniques.
Security Clearance Requirements:
Must currently hold a security clearance at the Secret level. US Citizenship is a requirement for Secret clearance at this location.