Oversee and Govern
Cybersecurity Management
Ukraine
Full Time
Part-Time $6 per hour
Temporary
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats an`d vulnerabilities.
Knowledge of encryption algorithms
Knowledge of data backup and recovery.
Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
Knowledge of Risk Management Framework (RMF) requirements.
Knowledge of network traffic analysis methods.
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
Knowledge of server administration and systems engineering theories, concepts, and methods.
Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.
Knowledge of current and emerging threats/threat vectors.
Knowledge of system administration, network, and operating system hardening techniques.
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Knowledge of an organization's information classification program and procedures for information compromise.
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
Knowledge of penetration testing principles, tools, and techniques.
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)
Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
Ability to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements).
Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.