Performs all procedures necessary to ensure the surety and safety of cyber security assets and to protect systems from intentional or inadvertent access or destruction. Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems, network, databases, and Web-based security. Analyzes and defines security requirements. Designs, develops, engineers, and implements solutions to cyber security requirements. Gathers and organizes technical information about an organization’s mission goals and needs, existing security products, and ongoing programs in the computer security arena. Performs risk analyses which also includes risk assessment. Directly support theater-level Air Force defensive cyber posture, to include vulnerability compliance status, significant incidents and available cyber forces. Coordinate with multiple visiting Cyber Protection Teams (CPTs) to facilitate assessments on key terrain. Facilitate large and small scale cyber awareness and defensive training. Review and analyze cyber tasking orders in order to provide situational awareness to senior leaders and prepare cyber defense organizations with required documentation to mitigate emerging threats and ensure compliance with documented policies.. Provide pre-mission, mission, and post mission coordination for specialized cyber protection teams.. Monitors and analyzes Intrusion Detection Systems (IDS) to identify security issues for remediation Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information Evaluates firewall change requests and assesses organizational risk Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems Assists with implementation of countermeasures or mitigating controls Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans Develops, tests, and operates firewalls, intrusion detection systems, enterprise antivirus systems and software deployment tools Safeguards the network against unauthorized infiltration, modification, destruction, or disclosure Researches, evaluates, tests, and implements new security software or devices Conducts investigations of information systems security violations and incidents, reporting as necessary to management Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices Implements, enforces, communicates, and develops security policies or plans for data, software applications, hardware, telecommunications, and information systems security education/awareness programs Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance Prepares incident reports of analysis methodology and results Synchronize incident response between local cyber defenders, external organizations and leadership. Ensure compliance with regulations and privacy laws May serve as a team or task lead
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees