Home

Cyber Security Industrial Control Systems (ICS)-US Citizen with Security Clearance at Remote, Remote, USA
Email: [email protected]
From:

Mallikarjuna,

Sourcemantra

[email protected]

Reply to:   [email protected]

Dear Professional -

Cyber Security Industrial Control Systems (ICS)/ Cyber Security consultant-

US Citizen with Security Clearance

Remote -Occasional when required to customer sites

Long term 

Primary Skills:   ICS, Threat & Vulnerability Management

Must be a US Citizen with Security Clearance.

Job Description

Travel

Occasional when required to customer sites.

Must be an US Citizen with Security Clearance

.

Job Description:

NIST CSF Controls for ICS Analysis

Network Architecture

Firewall Review

Server and Workstation Security Review

Communications and Protocols Analysis

Relevant certifications such as CISSP, CISM, GIAC, or ICS-specific certifications preferred.

Proven experience in 

ICS security 

with a strong understanding of 

industrial protocols and control system architectures

.

Proficiency in 

conducting vulnerability assessments 

and penetration testing in ICS environments.

In-depth knowledge of cybersecurity best practices, standards, and frameworks.

Status Reports: 

Partner will provide results on a regular basis throughout the assessment.  These results will include completed tasks, observations, proposed next steps and any decisions needed.

Critical Vulnerability List:

  Should Partner identify any critical vulnerability that may pose an imminent threat to application, infrastructure or data security, Partner will issue a Critical Vulnerability List (CVL) that will provide developers and management with the detail needed to address the observations.

Risk Assessments 

- guided by the organizations overall risk management process or previous risk assessment activities. We analyse the operational environment in order to discern the likelihood of a cybersecurity event and the impact that the event could have on the organization. We further identify emerging risks and use cyber threat information from internal and external sources to gain a better understanding of the likelihood and impact of cybersecurity events.

Determine, Analyze, and Prioritize Gaps

 - compare the current profile and the target profile to determine gaps. Create a prioritized action plan to address gaps reflecting mission drivers, costs and benefits, and risks to achieve the outcomes in the target profile. Partner works with the BlackBerrys client to then determine resources, including funding and workforce, necessary to address the gaps.

Target quarterly assessments and reviews to show progress and maturity in the 

Information Security Program

.

Keywords:
[email protected]
View all
Mon Feb 05 22:50:00 UTC 2024

To remove this job post send "job_kill 1085555" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 0

Location: ,