Cyber Analyst

About Cask Cask is a woman-owned small business and is certified by the State of California as a Micro Business and by the SBA as an Economically Disadvantaged Woman-Owned Small Business (EDWOSB) and Small Disadvantaged Business (SDB). Cask was founded in 2004 by a group of professionals who saw the need to help clients use and unlock the value of technology in more efficient, cost-effective ways. Cask delivers business and technology advisory and consulting services to help our customers achieve success. The Information Assurance / Cybersecurity Analyst will provide cybersecurity and information assurance support to the Program Manager, Applications Portfolio, PfM SES, Marine Corps Systems Command. Key Duties Provide information system security engineering support for all assigned PM Applications portfolio information systems and the PM Applications Program Management Office as part of an integrated product team Provide technical knowledge and expertise to support engineering change proposals and change requests by reviewing proposed modifications to system baselines, evaluating cybersecurity impact to design, and advising the integrated product team Develop and maintain the Department of Defense (DoD) Instruction 8510.01 compliant risk management framework (RMF) authorization packages for all assigned systems and applications utilizing the Marine Corps Certification and Accreditation Support Tool (MCCAST) Develop the security assessment plans for all assigned systems to include detailing how to test and validate the applicable RMF controls and delivering the final test plan a specified number of days prior to the scheduled self-assessment test event Conduct pre-assessments based on the security assessment plans as directed Perform technical and non-technical system cybersecurity assessments on assigned systems and document results Develop, update, and maintain assigned systems' and applications' plans of actions and milestones Provide support to the preparation and evaluation of technical documents, papers, studies, analysis, and briefings in support of the acquisition of major automated information systems Qualifications Minimum of 8 years of experience in information technology, all of which must have been in the previous 10 years and in direct support of DoD Information Assurance / Cybersecurity Demonstrated experience developing and implementing enterprise cybersecurity standards Demonstrated experience developing and implementing system specific cybersecurity standards and procedures Demonstrated proficiency in analyzing moderately complex cybersecurity-related technical problems and providing engineering and technical support for a resolution Demonstrated experience in performing vulnerability and risk analyses of computer systems and applications during the system development life-cycle Demonstrated knowledge of and experience with implementing the DoD RMF Demonstrated ability to work as part of a large and diverse team Must have Security+, at a minimum, or one or more of the following IA certifications: Certified Authorization Professional (CAP); GIAC Security Leadership Certificate (GSLC); Certified Information Systems Security Professional (CISSP); CompTIA Advanced Security Practitioner (CASP); or Certified Information Security Manager (CISM) Must meet requirements of DoD 8570.01-M Information Assurance Manager (IAM) Level II/ SECNAV-M 5239.2 Intermediate / Journeyman Proficiency Level High School Diploma or Equivalent Security Clearance: All personnel must have an active Secret security clearance. Cask is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, gender, age, status as a protected veteran, among other things, or status a qualified individual with a disability. EEO/Employer/Vet/Disabled
Salary Range: $80K - $90K
Minimum Qualification
8 - 10 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.