Information Technology Strategies, Inc Logo

Information Technology Strategies, Inc

Cybersecurity Lead

Reposted 9 Days Ago
Remote
Hiring Remotely in United States
Senior level
Remote
Hiring Remotely in United States
Senior level
The Cybersecurity Lead provides expert analysis and support for complex cybersecurity issues, guides technical solutions, and develops new methodologies while ensuring compliance with U.S. Government regulations.
The summary above was generated by AI

Information Technology Strategies, Inc. is a government IT solutions provider servicing commercial and government initiative in various parts of the United States. We are currently seeking a Cybersecurity Lead to work for our company.

Summary:

  • Must have a current U.S. Government SECRET / IT-II Clearance. (Sponsorship will not be provided)
  • Will serve as a Lead for supporting and enhancing our Oracle EBS 12.x ERP solution. 
  • Will provide expert-level support, conduct in-depth analysis of complex problems, serve as a primary technical authority for the Cybersecurity Assessment Program, and guide the development and implementation of advanced security solutions. 
  • Provides expert support, research, and analysis for exceptionally complex cybersecurity problems and processes. Implement and enforce cloud security best practices.
  • Serves as the technical expert and lead for the Cybersecurity Assessment Program, offering technical direction, interpretation, and innovative alternatives to complex security challenges.
  • Applies advanced technical principles, theories, and concepts to the Oracle EBS environment and related infrastructure.
  • Contribute to the development of new cybersecurity principles, concepts, and methodologies tailored to the ERP landscape.
  • Addresses unusually complex technical security problems, providing highly innovative and ingenious solutions.
  • Recommends and evaluates cybersecurity software tools, assisting in the development of software tool requirements and selection criteria.
  • Possess a strong understanding and application of the Security Technical Implementation Guide (STIG) process. Develop product-specific STIGs from applicable SRGs (Security Requirements Guide).
  • Determines and pursues necessary courses of action to achieve desired security results, often self-initiating assignments.
  • Develops advanced technological security ideas and guide their development into final products.
  • Serves as the primary expertise source in cybersecurity and evaluations, particularly within the Oracle EBS context.
  • Collaborates with Hosting provider's (data center or cloud) Engineering team to ensure strict compliance with security requirements.
  • Analyzes information security requirements and proactively address evolving cyber threats.
  • Leads vulnerability and CVE assessment and remediation efforts.
  • Oversees identity lifecycle management, IAM Permissions, and access controls.
  • Works with multiple SIEM tools and possess in-depth working knowledge of Oracle Audit Vault and Database Firewall (AVDF).
  • Leads in the creation and maintenance of application security configuration documentation, policies, and standards.
  • Possesses advanced-level experience in implementing, developing, managing, and supporting Identity, Credential, and Access Management (ICAM) solutions.
  • Utilizes and guide the use of multiple security assessment tools (e.g., Oracle Database Security Assessment Tool (DBSAT)).
  • Leads Cyber Operational Readiness Assessments (CORA).
  • Must be willing and able to travel to the client site in Washington, DC approximately 25% annually.

Requirements: 

  • Must have a current U.S. Government SECRET / IT-II Clearance. (Sponsorship will not be provided)
  • Must have one of the following Command Cyber Readiness certifications: Retina scan analysis, Operating Systems (Windows, Unix), Boundary defense (network policy, router, firewall), Internal defense (L2 switch, L3 switch), DNS (policy, BIND/Windows), HBSS (remote console, AV, ABM, PA, HIPS, ePO), Traditional security (Common, Basic, NCV, SCV), Wireless communications (BES, handhelds).
  • Must hold a Tenable Certified NESSUS Auditor certification.
  • Must hold one of the following IAM Level III Certifications: CISM, CISSP, GSLC.
  • Must hold one of the following IAT Level II Certifications: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, CASP CE, CCNP Security, CISA, CISSP, GCED, GCIH.
  • As a DISA FSO certified Team Lead, must hold a certification in penetration testing, such as: Licensed Penetration Tester (LPT), Certified Expert Penetration Tester (CEPT), Certified Ethical Hacker (CEH), Global Information Assurance Certification Penetration Tester (GPEN).
  • Must currently have or be willing to obtain one of the following certifications: Oracle Cloud Infrastructure (OCI) Foundations 2020 Certified Associate, Oracle Certified Associate (OCA), Oracle WebLogic Server 12c Administrator, Oracle Java SE 8 Programmer I, Oracle Enterprise Manager 12c Essentials (OEM 12c), Oracle Business Intelligence Publisher (BIP) 12c R1: Fundamentals, Oracle Planning 202x Certified Implementation Specialist (CIS), and Oracle Identity Governance 12c: Essentials.
  • Must have 7+ years of IT experience.
  • Must have 5+ years of Information Assurance (IA) experience.
  • Must have 3+ years of experience with DoD Vulnerability Management.
  • Must possess expertise in Oracle technologies, specifically in supporting and enhancing Oracle EBS 12.x solutions.
  • Proven proficiency performing CCRI/ vulnerability assessment/ penetration testing on networks, databases, computer applications, and IT frameworks.
  • Strong analytical and problem-solving skills for resolving complex security issues.
  • Strong skills implementing and configuring networks and network components.
  • In-depth knowledge and understanding of DOD security regulations and DISA STIGs.
  • Strong knowledge of SCAP and RMF.
  • Excellent knowledge of and proficiency with: VULNERATOR, USCYBERCOM CTO Compliance Program, Wireless vulnerability assessment, Web Services (IIS, Apache, Proxy), Databases (SQL Server, Oracle), Email Services (Exchange), Vulnerability Scans (NESSUS, SCCM), Phishing exercises, USB Detect, and Physical Security.
  • Must be willing and able to travel to the client site in Washington, DC approximately 25% annually.

Work With Us

IT-Strat is a technology consulting company that holds various contract vehicles including best in class vehicles. IT-Strat has supported multiple clients including the Department of Homeland Security (DHS), Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE via both prime and meaningful subcontracts). Additionally, IT-Strat has prime contracts with Defense Information Systems Agency (DISA), Defense Logistics Agency (DLA) and many others. We maintain relationships with multiple large businesses.

IT-Strat was established in 2002. We are a certified Woman Owned Small Business. IT-Strat also successfully graduated as a SBA 8(A) company. It was an 8(a) company from 2008 through 2017 and currently still has 8(a) contract vehicles.

Benefits We Offer:

  • Four Medical/Vision options including an HSA plan.
  • Dental and Orthodontia plan
  • Vision Materials plan
  • Paid Life, Short-Term Disability, and Long-Term Disability
  • 401K Retirement Program with company contribution
  • Paid Vacation, Holidays, Sick Leave, Floating Holidays, Bereavement Leave
  • Semi-monthly pay cycle

Information Technology Strategies (“IT-Strat”) is an Equal Employment Opportunity employer, and it is our policy to consider applicants for employment without regard to sex, race, color, creed, religion, national origin, sexual orientation, marital status, age, disability, veteran status, alienage, ancestry, and any other factors prohibited by law. Employment selections are based on company and client requirements and the qualifications and skills of the candidate. IT-Strat is committed to actively capitalizing on the diversity of skills, talents, and perspectives of our employees.

Top Skills

Command Cyber Readiness Certifications
Iam Level Iii Certifications
Iat Level Ii Certifications
Nessus
Oracle Certifications
Tenable Certified Nessus Auditor
Vulnerator

Similar Jobs

25 Days Ago
Remote
6 Locations
126K-189K Annually
Senior level
126K-189K Annually
Senior level
Information Technology • Utilities
Lead Cybersecurity Architect to define architecture vision, ensure compliance with standards, and manage cybersecurity strategies, requiring extensive security technology experience.
Top Skills: Cloud/Hybrid-Based EnvironmentsIt ForensicsNist FrameworksSecurity ArchitecturesSoc
An Hour Ago
Remote
Texas, USA
Mid level
Mid level
Healthtech • Logistics • Pharmaceutical
The Cyber Risk Analyst III will manage the Third-Party Cyber Risk Assessment program, ensuring risks are identified, evaluated, and mitigated while collaborating with various teams and stakeholders.
Top Skills: Anti-VirusEdrEmail Security GatewayFirewallHTML/CSSJavaScriptMicrosoft Office SuiteProxiesPythonSIEMSoarSQLVpn Ids/Ips
An Hour Ago
Remote
Trenton, NJ, USA
Mid level
Mid level
Healthtech • Logistics • Pharmaceutical
The Cyber Risk Analyst III will manage third-party cyber risk assessments, collaborate with stakeholders, and oversee risk mitigation strategies while mentoring junior team members.
Top Skills: Anti-VirusAvEdrEmail Security GatewayFirewallFirewallsHTML/CSSJavaScriptProxiesPythonSIEMSoarSQLVpn Ids/Ips

What you need to know about the Boston Tech Scene

Boston is a powerhouse for technology innovation thanks to world-class research universities like MIT and Harvard and a robust pipeline of venture capital investment. Host to the first telephone call and one of the first general-purpose computers ever put into use, Boston is now a hub for biotechnology, robotics and artificial intelligence — though it’s also home to several B2B software giants. So it’s no surprise that the city consistently ranks among the greatest startup ecosystems in the world.

Key Facts About Boston Tech

  • Number of Tech Workers: 269,000; 9.4% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Thermo Fisher Scientific, Toast, Klaviyo, HubSpot, DraftKings
  • Key Industries: Artificial intelligence, biotechnology, robotics, software, aerospace
  • Funding Landscape: $15.7 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Summit Partners, Volition Capital, Bain Capital Ventures, MassVentures, Highland Capital Partners
  • Research Centers and Universities: MIT, Harvard University, Boston College, Tufts University, Boston University, Northeastern University, Smithsonian Astrophysical Observatory, National Bureau of Economic Research, Broad Institute, Lowell Center for Space Science & Technology, National Emerging Infectious Diseases Laboratories

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account