Trewon Technologies is a competitive firm providing enterprise-wide solutions to federal clients. Trewon brings a sophisticated service line in IT-related solutions from Business Intelligence, Data Analytics, Big Data, to Cloud technologies coupled with a diverse skill set in research and evaluation to federal clients. While working in specified fields, we also understand the importance of meshing business process optimization with solid data and program management.
Qualifications:
Minimum 2 years of Cloud experience and 7 years as a Cyber analyst.
Experience with system ATO for Cloud environments.
Experience with XACTA or similar IA tool.
Ability to apply advanced technical principles, theories, and concepts.
Experience in DOS INR TIO preferred. Alternatively, experience in the Intelligence Community (IC) is acceptable.
Cybersecurity certifications a plus (Note: DOD Directive 8570 is being superseded by DOD 8140).
Summary/Objectives:
Your future Senior Cybersecurity Compliance Cloud Analyst job duties include:
??Minimum 2 years of Cloud experience and 7 years as a Cyber analyst.
?Capture IC Data calls, Classified Spills and track from cradle to grave.
?Support ISSO/ISSM with Assessment and Authorization (A&A) requirements and drafting/updating security related RMF documentation.
?Experience with system ATO for Cloud environments.
?Experience with XACTA or similar IA tool.
?Able to apply advanced technical principles, theories, and concepts.
?Review and analyze systems architecture diagrams and networks to identify technical security requirements based upon the Risk Management Framework (RMF).
?Develop and provide cybersecurity risk management recommendations to the customer.
?Assess the technical, security and performance characteristics of new technologies, as they relate to policies and regulations.
?Assess security system needs and provide corrective actions into a coherent security strategy.
?Work with ISSO/ISSM to close assigned POA&Ms.
?Process and apply, NIST 800-53 series, CNSS, ICDs and other DoD guidelines in support of the system.
?Design, implement and evaluate cybersecurity processes to ensure compliance with all applicable security control requirements for the system.
?Direct support in creating strategies, processes, procedures, capabilities, and tools to develop, implement, and mature the Office's Cyber Security Program.
?Unified deliberate and crisis action planning, while integrating the execution of cyber defense plans.
?Integration of capabilities in concert with Intelligence Community Partners to ensure execution of cyber defense operations across prevention, detection, and response missions.