Senior Security Expert
... and PIA, using Federal Government information security policy (i.e. Information Security Manual, Protective Security Policy Framework) and the ACSCs Cyber Security principles and guidelines and recommended ...
... and PIA, using Federal Government information security policy (i.e. Information Security Manual, Protective Security Policy Framework) and the ACSCs Cyber Security principles and guidelines and recommended ...
... understanding of the various data security gaps and be able to advise on solutions to mitigate client concerns. Support and validate the discovery of sensitive information residing within data repositories (e. ...
... certifications such as CISSP (Certified Information Systems Security Professional), CCIE (Cisco Certified Internetwork Expert), and CISM (Certified Information Security Manager). Have a minimum of 12 ...
... strategic, Agency-wide oversight of Security across security governance, information security, personnel security, physical security, and cyber security and operations. The Cyber Operations ...
... the protection of Treasurys people, information and assets. The security team provides advice and expertise to the Chief Security Officer to apply the five ...
... the protection of Treasury’s people, information and assets.The security team provides advice and expertise to the Chief Security Officer to apply the five ...
... . Demonstrated knowledge of industry Cyber Security frameworks, best practices and standards including Federal Government information security policy (i.e. Information Security Manual, Protective Security Policy Framework) and the ACSCs ...
... First Assistant Secretary, Security Division currently reports directly to ... officers. 4. Effectively overseeing security arrangements internal to DPS as ... direction Focuses strategically Harnesses information and opportunities Shows judgment, intelligence ...
... and PIA, using Federal Government information security policy (i.e. Information Security Manual, Protective Security Policy Framework) and the ACSCs Cyber Security principles and guidelines and recommended ...
... B2C. Detailed understanding of ACSC Information Security Manual (ISM) or similar security standards and frameworks and their ... % 6.Detailed understanding of ACSC Information Security Manual (ISM) or similar security standards and frameworks and their ...