Experience in managing information assurance or security compliance programs
Experience drafting Standard Operating Procedures and directive policy documents
Familiarity with Microsoft update and patch management systems, IT security frameworks and governance models, and Common Vulnerability Scoring System (CVSS) v3.X or later standards
Familiarity with ITIL Version 4 concepts including Configuration Management and Service Asset Management
Experience with Microsoft Windows desktop operating systems
Experience with Microsoft Windows server operating systems including Active Directory, Group Policy, New Technology File System permissions, and Dynamic Host Control Protocol
Experience with key Information Technology concepts including shared storage, clustering, and virtualization
Familiarity with security and network technologies such as IPv6, Firewalls, Virtual Private Networks, Public Key Infrastructure, Intrusion Detection, and Forensic Appliances
Familiarity with International Organization for Standardization (ISO)/International Electro-technical Commission (IEC) 27001 framework
Prior experience of working in an international environment or organizations comprised of both military and civilian elements
DUTIES/ROLE:
Applies and maintains specific security controls as required by organizational policy and local risk assessments
Drafts and maintains documents supporting security accreditation for CIS in AOR
Drafts and maintains CIS Security policy documents
Liaises with operational partners to ensure security accreditation compliance requirements
Supports investigation of suspected attacks and security breaches
Provides detailed and specific advice regarding the application of their specialism to the organization's planning and operations
Assists in infrequent, limited management of Trellix ePolicy Orchestrator (ePO) and Endpoint Security (ENS) components required by NATO Cyber Security Centre (NCSC) policy on local and remote (deployed) devices in two security domains
Manages endpoint security components on disconnected and standalone devices in AOR
Monitors CIS logs for suspicious or anomalous activity and reports as required
Documents routine processes in Standard Operating Procedures
Configures and distributes two-factor authentication devices
Performs trend analysis of routine vulnerability assessments using automated and semi-automated tools, including Nessus Tenable
Provides vulnerability mitigation advice to stakeholders
Supports external service providers in management of local boundary protection and cyber security monitoring infrastructure
Provides CIS Security advice and training, as required
Executes the incident and change management processes in accordance with the Information Technology (IT) Information Library (ITIL) Version 4 framework
Contributes to Asset Configuration Patching and Vulnerability Management activities