Skill | Required/Desired |
Assessing and providing strategic direction for resolution of mission-critical problems, policies, and procedures. | Desired |
At least 5 to 8+ years experience in cybersecurity Architect, including compliance and risk management with a background in system and network security engineering. | Required |
BS/BA undergraduate degree. | Required |
Determining and implementing cybersecurity and privacy principles to organizational requirements. | Required |
Experience building defensible security architectures for operational technology with a focus in cloud security best practices | Desired |
Experience developing disaster recovery and continuity of operations policies, plans, and procedures. | Desired |
Experience developing incident response process and procedures with internal and external stakeholders. | Required |
Experience with defining, establishing and directing techniques for detecting host and network-based intrusions using intrusion detection technologies | Desired |
Knowledge of anti-forensics tactics, techniques, and procedures. | Desired |
Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code) | Desired |
Knowledge of DDoS appliances such as NetScout Arbor, Fortinet FortiGate. | Desired |
Knowledge of Insider Threat investigations, reporting, investigative tools and laws/regulations | Desired |
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. | Desired |
Knowledge of legal governance related to admissibility (e.g. Rules of Evidence). | Desired |
Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro). | Desired |
Knowledge of malware with virtual machine detection. | Desired |
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth) | Required |
Knowledge of NISTs Cybersecurity Framework (CSF) with a focus on response and recover control families. | Desired |
Knowledge of processes for seizing and preserving digital evidence. | Required |
Knowledge of system and application security threats and vulnerabilities. | Required |
Knowledge of types of digital forensics data and how to recognize them. | Desired |
Overseeing and interfacing directly with agency and interagency leaders during cyber incidents. | Desired |
Strong background in documenting and assessing NIST 800-53 and CJIS controls. | Required |
Strong understanding of vulnerability scanning solutions, and the ability to clearly document the associated risks and remediation timelines. | Desired |
Valid CISSP Certification | Desired |
Writing business/process documentation, developing models and graphics and making oral presentations to senior officials | Desired |