ISSO/Security Analyst at Aurora Flight Sciences
Cambridge, Massachusetts, USA -
Full Time


Start Date

Immediate

Expiry Date

12 Jun, 25

Salary

82000.0

Posted On

12 Mar, 25

Experience

3 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cissp, Linux, Interpersonal Skills, Security

Industry

Information Technology/IT

Description

POSITION OVERVIEW

At Aurora Flight Sciences, we design, build, and fly advanced aircraft and enabling technologies from concept to reality. We are searching for a talented and self-motivated ISSO/Security Analyst to help us create the future of flight. Responsibilities will include but not be limited to the following:

MINIMUM REQUIREMENTS

  • Education/experience typically acquired through advanced technical education (e.g. Bachelor) and typically 5 or more years’ related work experience or an equivalent combination of technical education and experience (e.g. PhD, Master+3 years’ related work experience, 9 years’ related work experience, etc.).
  • Active Secret clearance (or higher) or inactive clearance that’s eligible within the 24 month reactivation period.
  • Security + certification (or CISSP).
  • Exemplary interpersonal skills with ability to interact with all audiences; customers, senior level personnel, technical teams, and peers.
  • Ability to demonstrate both analytical and creative problem solving to resolve security challenges.
  • Must be US Person.

PREFERRED REQUIREMENTS

  • Experience performing risk assessments.
  • Experience with audit reduction tools.
  • Microsoft Intune and Purvue.
  • Palo alto firewalls and endpoint software.
  • Linux.

PHYSICAL REQUIREMENTS

  • Must be able to work onsite in our Cambridge MA facility 4 days a week.
Responsibilities
  • Provide support for a program, organization, system, or enclave’s information assurance program.
  • Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
  • Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
  • Evaluate security solutions to ensure they meet security requirements for processing sensitive data types.
  • Perform vulnerability/risk assessment analysis to support certification and accreditation.
  • Provide configuration management for information system security software, hardware, and firmware.
  • Manage changes to system and assesses the security impact of those changes.
  • Perform risk assessments.
Loading...