Cyber Security Industrial Control Systems (ICS)-US Citizen with Security Clearance at Remote, Remote, USA |
Email: [email protected] |
From: Mallikarjuna, Sourcemantra [email protected] Reply to: [email protected] Dear Professional - Cyber Security Industrial Control Systems (ICS)/ Cyber Security consultant- US Citizen with Security Clearance Remote -Occasional when required to customer sites Long term Primary Skills: ICS, Threat & Vulnerability Management Must be a US Citizen with Security Clearance. Job Description Travel Occasional when required to customer sites. Must be an US Citizen with Security Clearance . Job Description: NIST CSF Controls for ICS Analysis Network Architecture Firewall Review Server and Workstation Security Review Communications and Protocols Analysis Relevant certifications such as CISSP, CISM, GIAC, or ICS-specific certifications preferred. Proven experience in ICS security with a strong understanding of industrial protocols and control system architectures . Proficiency in conducting vulnerability assessments and penetration testing in ICS environments. In-depth knowledge of cybersecurity best practices, standards, and frameworks. Status Reports: Partner will provide results on a regular basis throughout the assessment. These results will include completed tasks, observations, proposed next steps and any decisions needed. Critical Vulnerability List: Should Partner identify any critical vulnerability that may pose an imminent threat to application, infrastructure or data security, Partner will issue a Critical Vulnerability List (CVL) that will provide developers and management with the detail needed to address the observations. Risk Assessments - guided by the organizations overall risk management process or previous risk assessment activities. We analyse the operational environment in order to discern the likelihood of a cybersecurity event and the impact that the event could have on the organization. We further identify emerging risks and use cyber threat information from internal and external sources to gain a better understanding of the likelihood and impact of cybersecurity events. Determine, Analyze, and Prioritize Gaps - compare the current profile and the target profile to determine gaps. Create a prioritized action plan to address gaps reflecting mission drivers, costs and benefits, and risks to achieve the outcomes in the target profile. Partner works with the BlackBerrys client to then determine resources, including funding and workforce, necessary to address the gaps. Target quarterly assessments and reviews to show progress and maturity in the Information Security Program . Keywords: |
[email protected] View all |
Mon Feb 05 22:50:00 UTC 2024 |