Information Technology
Risk Management
Risk Management
Threat Knowledge
Threat Knowledge
Incident Response
Incident Response
Network Security Control
Network Security Control
Develop System Assessment Report (SAR) with a Plan of Action and Milestones (POAM) to the Designated Approving Authorization Official to obtain the (ATO)
Development of information system categorization using the appropriate standard (NIST) guidance
Conduct Assessment Authorization on major applications and general support systems
Maintain Countermeasures processes, workflows, and tools
Assess threats, risks, and vulnerabilities from emerging security issues and also identified mitigation requirements
Analyze and define data requirements and specifications for log ingestion from various data sources