For more than a decade, Karthik Consulting has been a reliable and trusted advisor to our Government customers, providing independent and unbiased recommendations and solutions to mitigate risk and help solve IT issues. We bring the innovation, passion, and agility of the commercial sector to meet the unique challenges of this competitive space. Karthik Consulting is seeking Cybersecurity Specialist with the below skillset. Cybersecurity Specialist Fulltime with Karthik Consulting
Location: National Capital Region (Local Area telework 1 or 2 days in the office)
Clearance: TS/SCI Clearance Position Description
Cybersecurity Specialist Purpose: The Air Force ISR Digital Infrastructure Transformation paves the way for intelligence analysts to securely harness the latest technological advancements. It is orchestrated through Data and Analytics, Sense Making/Automation, Augmentation and AI (AAA), Networks, Hybrid and Multi-Cloud, Enterprise Services, and cybersecurity capabilities. This structure allows integration, synchronization, and coordination with the Intelligence IC, Department of Defense (DoD), and commercial partners. The AF IC's ability to advance its digital infrastructure transformation and deliver intelligence at the speed of relevance hinges on people, processes, and technology. Proactively informing and developing our digitally savvy Airmen on capability portfolio advancements will accelerate culture change and strengthen our warfighting capabilities across all domains. Technology evolution across all capability portfolios partnered with an implementation framework determine how our innovative analysts can outpace adversaries through maintaining the decision advantage. This transformation specifically focuses on the foundational technology and will feed the larger ISR Digital Transformation Strategy encompassing all aspects of the ISR enterprise. Scope: A qualified candidate will deliver professional management, system analysis, and technical assistance support services for daily cybersecurity and zero trust operations at Headquarters, Air Force (HAF). This includes, but is not limited to, activities related to governance, strategic planning, enterprise architecture, capability portfolio management, solutions analysis, solution implementation planning, performance and risk management, IT service management, systems engineering, innovative project management, data and analytics, training, program analysis, policy analysis, information technology analysis, and administrative technical support. Additionally, the candidate will offer cybersecurity and zero trust expertise to support existing, ongoing, and expanding programs, projects, technologies, processes, and workforce innovations throughout the Air Force Intelligence Community (AF IC) Information Environment. This work will be in alignment with desired strategic and operational outcomes. Education:
• Bachelors or Masters in Cybersecurity, Computer Science, Information technology or a STEM related field. Experience Level: • 6-12 years of experience Clearance Level:
• TS/SCI Clearance Location:
• National Capital Region (Local Area telework 1 or 2 days in the office) Soft Skills:
• Speaking and presenting
• Planning and project management
• Analytical thinking and problem-solving skills
• Cooperation and unity of purpose
• Flexibility and ongoing education
• Task management
• Leadership and management skills • Adaptability • Risk assessment and management Experience • Demonstrated capability in performing comprehensive risk assessments to identify and address potential security threats across large-scale programs, ensuring the protection of critical assets and information.
• Proven expertise in designing, implementing, and managing Zero Trust architectures within enterprise environments, effectively enhancing security by eliminating implicit trust and validating every stage of digital interactions.
• Skilled in developing and executing robust incident response plans, coordinating with relevant stakeholders to swiftly address and resolve security breaches, thus minimizing impact and ensuring rapid recovery.
• Experienced in identifying, analyzing, and mitigating vulnerabilities within IT systems, utilizing industry best practices to prevent potential security exploits and maintain system integrity.
• Proficient in implementing and managing continuous monitoring solutions to provide real-time insights into system security, facilitating the proactive identification and remediation of potential threats.
• Proven ability to work collaboratively with cross-functional teams, including IT, operations, and development, to assess and strengthen the overall cybersecurity posture of the organization.
• In-depth knowledge of the Risk Management Framework (RMF) processes, including the ability to navigate compliance requirements, perform risk assessments, and implement security controls in accordance with federal standards.
• Proficient in utilizing SIEM tools to monitor, detect, and respond to security threats in real time, ensuring the continuous protection of information systems.
• Extensive understanding of network security protocols and practices, including firewalls, intrusion detection/prevention systems, and VPNs to secure network environments.
• Conducted regular security audits to ensure compliance with organizational policies and federal regulations, identifying areas for improvement and implementing corrective actions.
• Hands-on experience in securing cloud environments, with knowledge of best practices for cloud security configurations and controls to protect data and applications.
• Skilled in gathering and analyzing cyber threat intelligence to anticipate and mitigate potential security risks, ensuring proactive defense against emerging threats.
• Implemented and managed endpoint security solutions to protect against malware, ransomware, and other cyber threats, ensuring endpoint devices are secure.
• Developed and delivered security awareness training programs to educate employees on best practices and cybersecurity protocols, fostering a security-conscious culture.
• Created and maintained comprehensive disaster recovery plans to ensure business continuity in the event of a cyber incident, enabling rapid recovery and minimal downtime.
• Skilled in strategic communications and knowledge management using tools such as SharePoint, Jira, Confluence, and Mattermost. Key Responsibilities of Cybersecurity Specialist
• Conduct Risk Assessments: Carry out in-depth risk assessments at the program level to systematically identify potential security threats. Based on these assessments, propose actionable strategies to effectively mitigate the identified risks and enhance overall security posture.
• Advise on Zero Trust Architecture: Deliver in-depth strategic guidance and detailed recommendations for the design and implementation of Zero Trust architectures across the entire enterprise. The recommendations should outline best practices for establishing strict identity verification protocols, continuous monitoring, and micro-segmentation of networks
• Coordinate Incident Response Planning: Craft and propose detailed incident response plans that outline clear procedures and protocols, empowering stakeholders with the necessary tools and knowledge to swiftly and effectively address and resolve security breaches when they occur. These plans should include predetermined roles, communication strategies, and step-by-step actions to ensure a coordinated and efficient response to potential threats.
• Develop Security Policies: Design and propose comprehensive security policies that align with AF IC standards and regulations. These policies should establish a solid framework for safeguarding organizational assets, sensitive information, and operational integrity, thereby enhancing the overall security posture of the organization and ensuring compliance with AF IC requirements.
• Recommend Continuous Monitoring Solutions: Recommend effective continuous monitoring practices and utilize advanced tools that deliver real-time insights into the security of systems. These strategies should enable organizations to identify and respond proactively to potential threats before they can cause harm.
• Collaborate with Cross-Functional Teams: Engage collaboratively with various teams across the organization to thoroughly assess the current cybersecurity posture. Provide detailed and actionable recommendations aimed at reinforcing and improving our security measures, ensuring a robust defense against potential threats.
• Develop Security Awareness Programs: Develop and recommend comprehensive security awareness training programs to effectively educate employees about essential cybersecurity best practices and protocols. These programs should cover topics such as recognizing adversarial activity, safeguarding sensitive information, creating strong passwords, and following safe browsing habits. • Provide Strategic Cybersecurity Guidance: Deliver comprehensive expert recommendations and actionable best practices on cybersecurity measures. Ensure that these strategies not only align with current industry standards but also adapt to emerging trends in the ever-evolving landscape of cybersecurity.
• Advise on Security Operation Centers: Provide comprehensive guidance on the establishment and implementation of Security Operations Centers (SOCs) designed to effectively safeguard both legacy systems and cloud environments. This includes strategies for monitoring, detecting, and responding to potential threats in both settings, ensuring robust protection against cyber risks while maintaining the integrity and availability of critical data and applications click apply for full job details