Location: Washington, DC
Clearance: Active Top Secret with eligibility for access to Sensitive Compartmented Information
Beyond SOF Referral Payment: $500 for tagging/sharing this post to someone who gets hired
Overview: The Federal Bureau of Investigation (FBI) established the Insider Threat Office (InTO) in 2014 to act as the central coordinating component for the FBI’s Insider Threat Detection and Prevention Program. The InTO leverages the specific strengths of existing insider threat programs and supports the centralization of technical, analytical, and administrative personnel and capabilities within the Bureau. The InTO identifies new tools required for a robust insider threat program, identifies key trends, and incorporates new data sets into analysis from various sources, working closely with internal administrative and investigative components to detect and deter insider threats.
Client supports strategic planning and program development efforts for InTO, including executing technical objectives associated with data exploitation and leading software development projects for InTO and its customers. The Critical Assets and Key Vulnerabilities Analyst provides advice and expert guidance on security issues affecting business processes and procedures that may be exploitable by insider threats, including the electronic processing, transmittal, and storage of sensitive and Classified information. The Critical Assets and Key Vulnerabilities Analyst promotes awareness of security issues and ensures sound security principles are practiced.
·Bachelor of Science degree in a technical field or a Bachelor’s degree in a non-technical field with demonstrated practical experience in a technical field
·At least 5 years of experience in information technology (IT), information systems, or network security (or a related field)
·Critical thinker and solution finder for complex IT security situations
·Familiarity with assessing risks in business processes, including processes associated with IT systems and/or processes vulnerable to insider threats
·Familiarity with IT monitoring tools, configuration management, managing or maintaining user accounts and system privileges, risk and vulnerability assessments, and operations threat assessments
·Knowledge of network protocols, network security, information assurance management, cyber security capability validations, and automated vulnerability scanning tools
·Excellent communications and interpersonal skills
·Proficiency with Microsoft Office applications
·Experience supporting federal government customers (FBI experience highly desirable)
Please contact us for now if you need to.
Basic: Post your positions thru our Candidate searchable "Position Builder" which includes your company contact information. With over 10,000 views a month, this maximizes your position requirement exposure to not only our highly qualified candidates but the entire SOF community and beyond. Initial posting exposure reaches an average of 40,000 people in the DoD, and Inter Agency with the highest exposure being over 70,000 and growing.
Basic Service: $50 per month
Premium Service: This service includes posting your positions and having BEYOND SOF staff assists in the vetting and selection process. This also includes a 30 day early termination refund or 90 day replacement. We tailor a service agreement that aligns with your business model and company strategy. Contact us email@example.com
Working with BEYOND SOF allows you access to our selective network of both US and International clients. Our focus is primarily new contract opportunities to formulate new enduring forms of revenue for our clients. Contact us to learn more at firstname.lastname@example.org
Up through NSA cleared. Contact us at email@example.com
For companies looking to streamline systems, better enable their human capital, expand ROI, buy small companies with niche capabilities that enhance overall strategy, or sell of divisions that will enable focusing on new directions. Contact us at firstname.lastname@example.org
Rapid Acquisition: Full spectrum.
We start with finding the funding first, then tailoring the solution within those constraints/enablers to offer the full turn-key solution. Let us move your product/service in both CONUS and International arenas...email@example.com