Find The Best Cyber Security Specialist Jobs For You

Where do you want to work?

0 selections

Top Cyber Security Specialist Skills

Below we've compiled a list of the most important skills for a Cyber Security Specialist. We ranked the top skills based on the percentage of Cyber Security Specialist resumes they appeared on. For example, 10.1% of Cyber Security Specialist resumes contained Information Technology as a skill. Let's find out what skills a Cyber Security Specialist actually needs in order to be successful in the workplace.

The six most common skills found on Cyber Security Specialist resumes in 2020. Read below to see the full list.

1. Information Technology

high Demand
Here's how Information Technology is used in Cyber Security Specialist jobs:
  • Implemented end user security awareness training programs, testing the knowledge of security compliance in relation to areas of information technology.
  • Established and managed an enterprise-wide information technology programs which ensured securing member information against both internal and external data loss.
  • Analyzed and configured information technology systems to ensure availability and security of information system to support over 2000 daily transitions.
  • Assisted the FDA by focusing on effectively integrating and aligning information security processes with FDA business and information technology goals.
  • Evaluated discovered security findings and provided guidance for bringing information technology systems to NIST security compliance.
  • Developed a Program Management Plan, which provided a process for implementing and maintaining an information technology security program.

Show More

2. Cyber

high Demand
Here's how Cyber is used in Cyber Security Specialist jobs:
  • Evaluated the effectiveness of existing cyber security controls, defensive strategies, and attack mitigation methods.
  • Updated and improved Cyber Security for the Application Management Department for Marine Forces Reserve Headquarters.
  • Conducted security assessment by coordinating cyber-attacks for testing; kept and analyzed log productions.
  • Worked closely with Government Cyber Security to gain and maintain Authorizations to Operate.
  • Documented the required cyber security control application.
  • Identified potential new cyber security controls.
  • Reviewed documentation and schematic diagrams of digital assets (DA) to determine if they were secure from cyber attack.
  • Documented how each of the technical cyber security controls per 10CFR73.54 requirements in Appendix D of NEI 08-09, Rev.
  • Led outreach across government and other stakeholders to identify security (cyber security) strategic needs for Health IT.
  • Performed Cyber Security Specialist activities to include but not limited to Risk Management Framework, Legacy DIACAP packages.
  • Conducted 130 Cyber Security Inspections, identified and corrected countless deficiencies, four networks across two classifications.
  • Documented how each of the Operational and Management cyber security controls per 10CFR73.54 requirements in Appendix E of
  • Comprehended NEI 15-09 for Cyber Security Event Notification to NRC, methods and requirements.
  • Developed and integrated cyber security programs and supporting systems for the Department of State.
  • Assisted in NRC Cyber Security inspection for milestones 1-7 within respected area of knowledge.
  • Featured panelist and speaker for cyber security, data protection, and privacy.
  • Developed web-based Cyber Security training program, mandated for all DoS employees.
  • Created the cyber security assessment process based on the Duke NRC CSP.
  • Performed or overseen stages of the cyber risk assessment process.
  • Developed and applied Cyber migrations plans.

Show More

3. Security Incidents

high Demand
Here's how Security Incidents is used in Cyber Security Specialist jobs:
  • Established a formal procedure for tracking internal IT security incidents & ensured incident response & escalation procedures were followed.
  • Responded to security incidents and conducted investigations and forensics to ensure that data systems and confidential data were not breached.
  • Monitored and coordinated resolution of security incidents submitted from third party Security Operations Center (Dell SecureWork's).
  • Leveraged ticketing systems to manage the security incidents and responses working with cross-functional teams.
  • Applied forensic investigation techniques to document root cause and impact of detected computer security incidents.
  • Worked with human resources and internal security departments to facilitate response to internal security incidents.

Show More

4. Procedures

high Demand
Here's how Procedures is used in Cyber Security Specialist jobs:
  • Monitored information technology resources to assess and sustain adherence to systems, policies, and procedures preventing unauthorized activity.
  • Collaborated with program managers and engineers to define stronger policy procedures and developing methods to secure medical devices.
  • Reviewed and updated corporate security policies, standards and procedures.
  • Authored and implemented NEI 08-09 compliant Password and Key Management procedures for Plant and Security Critical Systems and Assets.
  • Educated the employees on the procedures to be followed should they be faced with such individual attacks
  • Created required training plan for SONGS relating to new procedures and requirements
  • Maintained 100% procedural compliance with Nuclear Regulatory Commission (NRC) Cyber Security policies and regulatory compliance procedures.
  • Assisted in the development of the Cyber Security Program including guidance documents and procedures.
  • Created and wrote extensive Standard Operating Procedures (SOP) to enhance Cybersecurity Workforce development for over 50 Cybersecurity technicians.

Show More

5. Intrusion Detection

high Demand
Here's how Intrusion Detection is used in Cyber Security Specialist jobs:
  • Provided expertise on intrusion detection/monitoring tools.
  • Provided real-time monitoring of system integrity of ASIM Intrusion Detection Systems at every US Air Force installation ensuring enhanced network security.
  • Performed risk assessments, threat assessments, intrusion detection, vulnerability/risk validation, and secure application development- revised network architecture.
  • Provided configuration and support for enterprise anti-virus, patch management, two-factor authentication, and intrusion detection/prevention and logging systems.
  • Established the first Vulnerability Assessment Lab and intrusion detection test bed to proactively mitigate risks across complex and evolving environments.
  • Worked to identify and analyze security threats using intrusion detection and network monitoring tools and acts upon that information.

Show More

Job type you want
Full Time
Part Time
Internship
Temporary

6. DOD

high Demand
Here's how DOD is used in Cyber Security Specialist jobs:
  • Contracted to USMC to work on regional implementation of the DoD Risk Management Framework.
  • Certified in accordance with DODD 8570.1 Information Assurance Technician II.
  • Implemented and verified cybersecurity controls in accordance with DoD and Air Force standards.
  • Developed and coordinated MDA Classification Management Policy recommendations in consonance with Executive Branch and Department of Defense (DoD) policy.
  • Tested and evaluated applications against system patches and upgrades to ensure compatibility with DoD and commercial networks.
  • Led independent and objective evaluations and audits of security policy and DoDI 8500.2 controls implementation as prescribed by regulatory bodies.

Show More

7. Physical Security

high Demand
Here's how Physical Security is used in Cyber Security Specialist jobs:
  • Represented West's information security logical and physical security controls to customer/client audit teams at domestic and international locations.
  • Conducted comprehensive physical security vulnerability assessment of existing and planned facilities for the Internal Revenue Service headquarters building.
  • Managed physical security systems such as centralized two factor authentication and badge access systems.
  • Coordinated with engineering and technical personnel to repair/replace physical security equipment or systems.
  • Performed technical and physical security evaluations of information system security safeguards.
  • Conducted physical security reviews of acute care facilities and physician practice locations.

Show More

8. Network Security

high Demand
Here's how Network Security is used in Cyber Security Specialist jobs:
  • Reduced vulnerabilities within the environment using Retina, network security scanner and application security protection.
  • Performed all signed network security analysis duties, including verification and validation of alarms, recommendation of remediation actions and procedures.
  • Provided Information Assurance, network security, integration and implementation of computer systems and applications, analyzes and defines security requirements.
  • Learned detailed functional knowledge of DoD and/or DISA network security requirements, Information Assurance procedures and/or guidelines ensuring IAVA compliance.
  • Managed and completed complex security projects and technology implementations pertaining to data and network security ensuring a timely and successful outcome.
  • Performed computer and/or network security vulnerability assessment to identify, evaluate and mitigate security risk, threats and vulnerabilities.

Show More

9. Nist

high Demand
Here's how Nist is used in Cyber Security Specialist jobs:
  • Provided support to network administrator by installing new servers.
  • Generated detailed vulnerability reports to responsible administrators.
  • Supported distributed security administrative environment.
  • Worked with local programmers and Network General staff to have InfiniStream full packet capture capability from ArcSight console providing forensics capability.
  • Developed a 64 page security assessment document for the current Security Administrators to use in remediation of security control weaknesses.
  • Provided system administration in specialized areas such as software, critical networked servers, data access/analysis, and academic research.

Show More

10. Assurance

high Demand
Here's how Assurance is used in Cyber Security Specialist jobs:
  • Provided qualitative and quantitative reports for measuring Information Assurance assessment progress and successes for each program being validated.
  • Developed project status reports for detailed and thorough visibility of contract performance and Quality Assurance.
  • Worked directly with the Information Assurance office to complete all information security projects.
  • Developed Board information assurance/security training.
  • Developed Information Assurance/Security Program documentation leading to Certification and Accreditation for several entities of the Department of Defense (DoD).
  • Employed systems and Information Assurance engineering expertise to lead the acquisition, development, and implementation of secure communications programs.

Show More

Jobs With Trending Skills

11. Forensics

high Demand
Here's how Forensics is used in Cyber Security Specialist jobs:
  • Performed network and systems monitoring and analysis, incident management/remediation and forensics activities.

Show More

12. Security Requirements

high Demand
Here's how Security Requirements is used in Cyber Security Specialist jobs:
  • Managed security requirements analysis, engineering design reviews, security testing oversight, and risk remediation planning.
  • Assisted in preparing preventative maintenance plans to cover security requirements.
  • Analyzed and defined security requirements, via DIACAP standards.
  • Developed, updated and maintained efficient agency-wide policies and procedures to ensure IT practices are compliant with government and security requirements.
  • Recommended resolutions for security issues and breaches, and substantiated links between documented security requirements in a secure environment.
  • Designed, developed, engineered, and implemented solutions to security requirements as they pertained to the network infrastructure.

Show More

13. RMF

high Demand
Here's how RMF is used in Cyber Security Specialist jobs:
  • Assisted with Risk Management Framework (RMF).
  • Performed NIST 800-53 security controls assessment in accordance with NIST 800-37 Risk Management Framework (RMF).
  • Experienced in system classification and categorization using the RMF processes to ensure system CIA.
  • Ensured required Annual Security Testing for unclassified systems per RMF Knowledge Service.
  • Utilized RMF methodology as guidance during A&A resiliency efforts.
  • Initiated and review artifacts in compliance with NIST RMF process.

Show More

14. Windows

average Demand
Here's how Windows is used in Cyber Security Specialist jobs:
  • Installed, operated, and maintained Microsoft Windows LAN Server/Client Software and equipment.
  • Installed VMware and created multiple VMs and installed Windows Server 2003/2008 R2/2012 and configured/patched the VMs to participate in network requirements.
  • Coordinated Windows vulnerability remediation efforts.
  • Performed accreditation and certification testing on Microsoft Windows-based systems, executed security test plans, and reported on testing results.
  • Processed routine firewall requests; ensure requests comply with overall security policy and implement changes during appropriate change management windows.
  • Installed, configured and tested various Microsoft Windows Server 2003 Operating Systems and applications to ensure Common Criteria security compliance.

Show More

15. Infrastructure

average Demand
Here's how Infrastructure is used in Cyber Security Specialist jobs:
  • Conducted trend analysis with a focus on proactive identification of threats that indicate potential vulnerabilities to the program infrastructure.
  • Bolstered integrity of vulnerable IT infrastructure by introducing robust security processes and procedures.
  • Performed Vulnerability scans on networks and network infrastructure.
  • Maintained the Public Key Infrastructure.
  • Enforced cyber security policies to protect organization infrastructure, networks and data on-site Albuquerque Complex, NM.
  • Worked with a contract team to analyze and support agency Critical Infrastructure Protection program, including detailed vulnerability policy analysis.

Show More

16. Siem

average Demand
Here's how Siem is used in Cyber Security Specialist jobs:
  • Documented, supported and coordinated vendor support for SIEM software BlackStratus.
  • Evaluated several SIEM products and purchased AlienVault USM as the environments primary security monitoring technology.
  • Utilized various security monitoring applications SIEM, Packet Analyzer, Flow Analyzer.
  • Maintained and monitored ArcSight SIEM infrastructure for corporate security.
  • Managed central logging SIEM infrastructure and security alerting.
  • Re-engineered SIEM platform to renew its usefulness to Information Security.

Show More

17. Security Standards

average Demand
Here's how Security Standards is used in Cyber Security Specialist jobs:
  • Trained junior soldiers in Active Directory Administration, IT Security Standards, Networking, and Windows Troubleshooting.
  • Ensured operational security controls were implemented in accordance with AXA Group Information Security Standards, SOX legislation and industry best practice.
  • Managed operational risk through program testing and monitoring by analyzing global information security standards to identify potential risk.
  • Performed detailed application and system assessments to determine vulnerabilities and ensure compliance with all security standards and guidelines.
  • Reviewed and analyzed configurations, architecture and implementations to verify compliance with security standards and practices.
  • Developed, documented and implemented data collection, processing, delivery and security procedures that enforced information security standards.

Show More

18. Management System

average Demand
Here's how Management System is used in Cyber Security Specialist jobs:
  • Operated Electronic Key Management System, other information security duties, and Public Key Infrastructure.
  • Designed, developed, tested, and documented cryptographic products, trusted networks, database management systems and telecommunications subsystems.

Show More

19. IP

average Demand
Here's how IP is used in Cyber Security Specialist jobs:
  • Collaborated with multiple agencies to create a streamline program for disseminating information between departments to increase efficiency during project management.
  • Rejuvenated relationships with sales partner ecosystem and leveraged indirect channel to penetrate new, high-profile opportunities.
  • Configured and maintained communications and encryption equipment, documented cabling schematics.
  • Aided in the Emission Security program, ensuring that all equipment met the requirements for separation of unclassified and classified networks.
  • Conducted site security inspections of transmission substations and power generation facilities using NERC CIP & NIST 800-53 standards.
  • Approved requests to register domains with DNS and maintained log of all NIH registered IP's.
  • Developed and strengthened working relationships with other IT units, customers, and partners.
  • Represented Hermitage High School as one of twenty FBLA participants in Washington, DC.
  • Assisted managing multiple images with the newest and most to date security patches.
  • Performed walk-downs of plant equipment for an in-person review of systems and components.
  • Performed simple troubleshooting on network equipment ex.
  • Organized and de-conflicted planned test schedules between multiple programs and government organizations.
  • Maintained various communication equipment types used on base.
  • Worked as an escalation tier two team member supporting multiple IPS, Routing and Firewall devices for various customers.
  • Participated in managing, planning, and executing Systems Engineering Lifecycle (SLC) integration and testing stage reviews.
  • Created multiple detailed diagrams of NIH networks using Visio.
  • Created "Tip of the Day" email campaign to reinforce awareness.

Show More

20. Hbss

average Demand
Here's how Hbss is used in Cyber Security Specialist jobs:
  • Participated in Government Acceptance Testing (GAT) for the DoD Mobility Program and Host Based Security System (HBSS).
  • Served as a technical administrator for McAfee HBSS, ISS Site Protector, and ArcSight Enterprise.
  • Analyzed and tested DISA created signatures to determine impacts on production HBSS systems around the world.
  • Developed and created McAfee Host Base Security System (HBSS) deployment for the AFSCN.
  • Maintained and updated HBSS base images for new deployments and disaster recovery capabilities.
  • Provided Host Security input to improve IA policy enforcement via HBSS Policy.

Show More

21. Risk Assessments

average Demand
Here's how Risk Assessments is used in Cyber Security Specialist jobs:
  • Provided security architecture and industry practices subject matter expert knowledge for all team members performing third party vendor risk assessments.
  • Promoted to Senior Security Analyst to research open source intelligence for preparation of timely and sensitive risk assessments for company employees.
  • Performed risk assessments and threat modeling to articulate the levels and types of security controls appropriate application/product initiatives.
  • Performed documentation support for security engineers and analysts, on developments of System Security Plans, Contingency Plans and Risk Assessments.
  • Communicated the results of risk assessments to senior management and appropriate stakeholders to enable risk-based decision making.
  • Reviewed risk assessments and analyzed the effectiveness of information security control activities and reported on them, providing actionable recommendations.

Show More

22. Security Systems

average Demand
Here's how Security Systems is used in Cyber Security Specialist jobs:
  • Performed full Cyber Security Assessments of Physical Security Systems.

Show More

23. Vulnerability Assessments

average Demand
Here's how Vulnerability Assessments is used in Cyber Security Specialist jobs:
  • Performed vulnerability assessments with validation via external/internal vulnerability scans.
  • Performed vulnerability assessments based on the process and standards within DoD Information Technology Security Certification and Accreditation Process (DITSCAP).
  • Performed network Vulnerability Assessments using tools to evaluate attack vectors, develop remediation plans, Identify System Vulnerabilities and Security Procedures.
  • Contributed to improving the Security Assessment process, which is used to perform Security Risk Assessments, Vulnerability Assessments and Security Reviews
  • Conducted risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs.
  • Participated in Business Unit vulnerability assessments using the security Matrix developed and assisted in the penetration test activities using NESUS.

Show More

24. Firewall

average Demand
Here's how Firewall is used in Cyber Security Specialist jobs:
  • Redesigned the NRG Cisco ASA Firewall environment to isolate the protected Electric Network from the field operations team systems.
  • Managed and monitored enterprise antivirus and software firewall programs.
  • Performed internal audits of all firewall configurations and physical and logical network topology; also provided guidance on remediation and correction.
  • Researched and assessed (defined requirements, identified, tested, and evaluated) server-based firewall and intrusion prevention solutions.
  • Evaluated firewall change requests & assessed organizational risks, email security monitoring including message identification, notification searches and analysis requests.
  • Evaluated and developed comprehensive security policies (Business Continuity, Firewall Management using Managed Security Services, Disaster Recovery etc.)

Show More

25. Information Security

average Demand
Here's how Information Security is used in Cyber Security Specialist jobs:
  • Performed Active Monitoring and Compliance Validation on Canadian Information Security Operations.
  • Recommended, developed, monitored, and enforced information security policies.
  • Assisted in the information security training program with security awareness articles.
  • Revised hospital information security policy documentation.
  • Performed both internal and external security vulnerability/information security assessments.
  • Provided advanced troubleshooting, educating other teams on networking and information security and engaged vendors to correct newly discovered application bugs.

Show More

26. IDS

average Demand
Here's how IDS is used in Cyber Security Specialist jobs:
  • Designed, deployed and racked security appliances/taps, IDS/IPS devices, network devices for communication and security purposes.
  • Integrated and created the modules of Suricata IDS/IPS, Low & High Integrated Honeypots (Dionaea and Argos).
  • Performed advanced anomaly detection and analysis of the internal/external DMZ environments utilizing IPS & IDS, and implemented corrective actions.
  • Provided subject matter expertise for IDS implementation, log auditing, monitoring, and performed vulnerability assessments.
  • Worked closely with the Global Vulnerability Assessment team to coordinate penetration testing and vulnerability scans with NIDS alerts.
  • Developed customized shell scripts which automated daily processes and standardized procedures for maintenance and configuration of the IDS.

Show More

27. Acas

low Demand
Here's how Acas is used in Cyber Security Specialist jobs:
  • Performed ACAS vulnerability management scanning and reporting.
  • Performed Vulnerability Management Team ACAS administration duties.
  • Utilized Assured Compliance Assessment Solution (ACAS), to scan for vulnerabilities in host machines to ensure security compliance.
  • Utilized Assured Compliance Assessment Solution (ACAS), to scan for vulnerabilities in work stations and servers.
  • Designed and implemented a plan to upgrade the ACAS infrastructure to include MDA's remote sites.
  • Assisted with Firescout troubleshooting ACAS flaws.

Show More

28. Disa

low Demand
Here's how Disa is used in Cyber Security Specialist jobs:
  • Ended at a major DISA Teleport telecommunications facility in Germany.
  • Created and maintained DISA security implementation guidance based on analysis of and guidance provided by the National Security Agency.
  • Planned development to include assessment and understanding of system safeguards, security provisioning and disaster preparedness and test plans.
  • Created and presented DISA security requirement implementation training to Field Security Operations personnel.
  • Developed and documented Backup and Disaster Recovery procedures for enterprise security solution.
  • Participated in business continuity and disaster recovery planning and implementation activities.

Show More

29. Nessus

low Demand
Here's how Nessus is used in Cyber Security Specialist jobs:
  • Maintained Web security using tools such as Nessus/OpenVas.
  • Tested and evaluated information systems using NESSUS software to detect vulnerabilities and improve on security.
  • Managed scanning tools to include, TENABLE, RETINA, NESSUS and GOLDDISK.
  • Performed scans using Nessus and Security Center for vulnerability scans and continuous monitoring of an environment consisting over 11000 endpoints.
  • Designed and implemented vulnerability Nessus scans and monitored networks using Security Center and Vulnerability Management Database (VMDB).
  • Performed Nessus active vulnerability scans and compliance checks to validate the integrity of application and operating system configuration baselines.

Show More

30. PKI

low Demand
Here's how PKI is used in Cyber Security Specialist jobs:
  • Prepared and maintained written guidance to assist with PKI renewal, downloading and importing PKI certificates within user workstations.
  • Provided a major role as a DIA Trusted Agent for Public Key Encryption (PKI).
  • Provided Tier I support to headquarters and field personnel concerning their PKI certificates.
  • Spearheaded and developed a Standard Operating Procedure for issuing Certificate Revocation Lists within a PKI environment.
  • Managed and maintained VeriSign MPKI Portal for all internal and external digital certificates.
  • Created PKI documentations related to certificate installation, troubleshooting and resolutions.

Show More

31. Personnel Adhere

low Demand
Here's how Personnel Adhere is used in Cyber Security Specialist jobs:
  • Provided advice that systems and personnel adhere to established standards and Governmental requirements for security on these systems.

Show More

32. Active Directory

low Demand
Here's how Active Directory is used in Cyber Security Specialist jobs:
  • Created and managed custom-defined groups, role-based system permissions, user accounts, security settings, and synchronization with Active Directory.
  • Maintained over 400 accounts in Active Directory on both NIPR/SIPR network, with continuous evaluation of log-in abilities.
  • Managed Active Directory of users, created accounts and set up e-mail in Microsoft Exchange.
  • Received Microsoft Professional Active Directory Training and participated in planning the roll-out during meetings in Kansas City.
  • Assisted in designing, implementing and evaluating applications, systems and utilities relevant to Active Directory services.
  • Designed centralized Windows 2003 active directory domain solution within a global corporate forest.

Show More

33. Security Issues

low Demand
Here's how Security Issues is used in Cyber Security Specialist jobs:
  • Analyzed and issued recommendations regarding privacy and security issues with wireless devices, apps, and cloud computing.
  • Provided consultation on security issues, developed policies and provided oversight for protecting the company's computing security systems.
  • Assisted system stewards to document and mitigate identified security issues (including requirements for security authorization).
  • Verified requesting agent was authorized change control agent and advised customers of security issues.
  • Investigated and provided expert advice on security issues to stakeholders and customers.
  • Assessed threats, risks, and vulnerabilities from emerging security issues and also identified mitigation requirements.

Show More

34. Data Availability

low Demand
Here's how Data Availability is used in Cyber Security Specialist jobs:
  • Coordinated review of logs and user access data availability and programs for both regular and privileged users.

Show More

35. POA

low Demand
Here's how POA is used in Cyber Security Specialist jobs:
  • Managed the POA&M for the system and worked with site and government personnel to mitigate items.
  • Developed and maintained the program POA&M, and briefed the customer on a monthly basis.
  • Assisted DAO (Delegated Authorizing Officers) with on-site testing for POA&M follow ups.
  • Supported security compliance activities including Plan of Action and Milestones Procedure (POA&M) management, and IFS audits.
  • Updated Plan of Action & Milestones (POA&M) and Risk Assessment based on findings assessed through monthly updates.
  • Updated POA&M tracking sheets as it pertains to information systems vulnerability findings tracking sheets on multiple systems.

Show More

36. DR

low Demand
Here's how DR is used in Cyber Security Specialist jobs:
  • Conducted certification and accreditation reviews, security test and evaluations, and drafted associated reports.
  • Designed and implemented management controls addressing risk assessment methodology and procedures
  • Drafted requests for information and assisted with modeling to predict effects of computer network operations (CNO).
  • Reviewed vendor documentation, including operating manuals, quick-start guides, drawings, and data sheets.
  • Developed Marine Corps Recruit Depot (MCRD) War-Driving Standard Operating Procedures (SOP).
  • Developed COOP/DR plans, and perform certification of Information Systems and Networks.
  • Updated drivers, virus software, and other digital protection measures.

Show More

37. Configuration Management

low Demand
Here's how Configuration Management is used in Cyber Security Specialist jobs:
  • Worked with 'cfengine' configuration management tool.

Show More

38. Scap

low Demand
Here's how Scap is used in Cyber Security Specialist jobs:
  • Performed re-certification and accreditation using the DITSCAP process on the project.
  • Maintained a strong awareness and understanding of the current threat landscape.
  • Performed a risk assessment on all machines for DITSCAP re-certification.
  • Developed SSAAs in accordance with DITSCAP.

Show More

39. Ensure Compliance

low Demand
Here's how Ensure Compliance is used in Cyber Security Specialist jobs:
  • Conducted periodic reviews of SSAA, SeCONOPs and other security documentation to ensure compliance with the accreditation/certification support documentation package.
  • Reviewed client and vendor contracts and service agreements to ensure compliance with federal banking and information security regulations.
  • Collaborated with Human Resources to ensure compliance of regulatory policies and the protection of personal and sensitive information.
  • Applied necessary security patches to ensure compliance and provide information to follow policy and procedures within the organization.
  • Designed security education and awareness programs, and carried out inspections to ensure compliance with government directives.
  • Coordinated security escalation activities within each unit to ensure compliance and compliance management.

Show More

40. DLP

low Demand
Here's how DLP is used in Cyber Security Specialist jobs:
  • Enforced/Configured security policies within checkpoint Smart-Dash-Board: Configured DLP, URL filtering.
  • Discovered risks & thereby implemented remediation processes in environments with DLP policy violations.
  • Served as DLP Single Point of Contact / SME for enterprise and SPOC for vendor technical issues resolution.
  • Implemented McAfee DLP DCM to control and restrict the use of removable media on classified systems.
  • Crafted DLP policies on the Exchange server to prevent leakage of PII information.
  • Created dashboards that correlated IPS/Email gateway, VSE and DLP.

Show More

41. Fisma

low Demand
Here's how Fisma is used in Cyber Security Specialist jobs:
  • Ensured assigned systems met FISMA compliance.
  • Conducted FISMA complaint security control assessments to ascertain the adequacy of management, operational, technical privacy controls.
  • Analyzed submitted documentation to certify sites as being security enabled according to FISMA guidelines.
  • Assigned to newly-formed Continuous Monitoring Branch for FISMA security policy compliance.
  • Performed FISMA continuous monitoring-related activities.
  • Provided NIST/FISMA standards for mandatory security training.

Show More

42. Security Plan

low Demand
Here's how Security Plan is used in Cyber Security Specialist jobs:
  • Completed ISSO duties including creation and modification of Risk Assessments, ST&E plans and modifications of Security Plans.
  • Recorded assessment results, conclusions and justifications, and transmitted documentation as required by the cyber security plan.
  • Developed Cyber Security Plan and implementation schedule.

Show More

43. Technical Support

low Demand
Here's how Technical Support is used in Cyber Security Specialist jobs:
  • Provided vulnerability notification alerts to all ODIN technical support departments and escalation of important or critical NASIRC notices.
  • Provided technical support on the Security Operations Center team involved in 24x7 information security response and security monitoring.
  • Provided technical support and consultation for the implementation and usage of delivery systems.
  • Provided technical support to customers and also ensured that all user accounts and information meets all organizational parameters
  • Provided technical support and consultation and ensured 24/7 operational support and maintenance.
  • Provided technical support for the enhancement of, and changes to security infrastructure configurations.

Show More

44. Stig

low Demand
Here's how Stig is used in Cyber Security Specialist jobs:
  • Conducted daily monitoring of assigned systems for performance and security; investigated security issues.
  • Performed security investigations, incident response and security operational support (SOC).
  • Worked on implementing DISA STIGS.
  • Conducted incident investigations, prepared documentation, and resolved trouble tickets for the FAA regarding all network anomalies and suspicious activity.
  • Performed data security incident and event investigations and responsible for escalation of security-related problem resolution and final root cause analysis.
  • Provided actionable investigative leads to law enforcement investigators in an effort to prevent future criminal or terrorist acts from occurring.

Show More

45. Security Violations

low Demand
Here's how Security Violations is used in Cyber Security Specialist jobs:
  • Managed mission-critical and highly sensitive electronic keys necessary for secure communications using a Simple Key Loader without any communication security violations.
  • Analyzed system security violations to document the causes of security breaches and determine potential solutions that required further investigation.
  • Assisted IAM by investigating, documenting and reporting actual and potential security violations, breaches or inappropriate computer usage.
  • Conducted incident prevention, detection and analysis, of potential and actual security violations.
  • Utilized real-time monitoring systems for possible intrusions, security violations and or vulnerabilities.
  • Discovered and corrected multiple security violations by end users through internal audits.

Show More

20 Most Common Skill For A Cyber Security Specialist

Information Technology10.1%
Cyber9.3%
Security Incidents6.8%
Procedures5.3%
Intrusion Detection4.5%
DOD4%
Physical Security3.7%
Network Security3.5%

Typical Skill-Sets Required For A Cyber Security Specialist

RankSkillPercentage of ResumesPercentage
1
1
Information Technology
Information Technology
10.1%
10.1%
2
2
Cyber
Cyber
9.3%
9.3%
3
3
Security Incidents
Security Incidents
6.8%
6.8%
4
4
Procedures
Procedures
5.3%
5.3%
5
5
Intrusion Detection
Intrusion Detection
4.5%
4.5%
6
6
DOD
DOD
4%
4%
7
7
Physical Security
Physical Security
3.7%
3.7%
8
8
Network Security
Network Security
3.5%
3.5%
9
9
Nist
Nist
3.2%
3.2%
10
10
Assurance
Assurance
3.1%
3.1%
11
11
Forensics
Forensics
2.9%
2.9%
12
12
Security Requirements
Security Requirements
2.5%
2.5%
13
13
RMF
RMF
2.4%
2.4%
14
14
Windows
Windows
2.2%
2.2%
15
15
Infrastructure
Infrastructure
2.1%
2.1%
16
16
Siem
Siem
2%
2%
17
17
Security Standards
Security Standards
1.9%
1.9%
18
18
Management System
Management System
1.8%
1.8%
19
19
IP
IP
1.7%
1.7%
20
20
Hbss
Hbss
1.7%
1.7%
21
21
Risk Assessments
Risk Assessments
1.6%
1.6%
22
22
Security Systems
Security Systems
1.5%
1.5%
23
23
Vulnerability Assessments
Vulnerability Assessments
1.5%
1.5%
24
24
Firewall
Firewall
1.4%
1.4%
25
25
Information Security
Information Security
1.4%
1.4%
26
26
IDS
IDS
1.4%
1.4%
27
27
Acas
Acas
1.3%
1.3%
28
28
Disa
Disa
1.3%
1.3%
29
29
Nessus
Nessus
1.1%
1.1%
30
30
PKI
PKI
1.1%
1.1%
31
31
Personnel Adhere
Personnel Adhere
1.1%
1.1%
32
32
Active Directory
Active Directory
1.1%
1.1%
33
33
Security Issues
Security Issues
1%
1%
34
34
Data Availability
Data Availability
1%
1%
35
35
POA
POA
1%
1%
36
36
DR
DR
0.8%
0.8%
37
37
Configuration Management
Configuration Management
0.8%
0.8%
38
38
Scap
Scap
0.7%
0.7%
39
39
Ensure Compliance
Ensure Compliance
0.7%
0.7%
40
40
DLP
DLP
0.7%
0.7%
41
41
Fisma
Fisma
0.6%
0.6%
42
42
Security Plan
Security Plan
0.6%
0.6%
43
43
Technical Support
Technical Support
0.6%
0.6%
44
44
Stig
Stig
0.5%
0.5%
45
45
Security Violations
Security Violations
0.5%
0.5%

32,906 Cyber Security Specialist Jobs

Where do you want to work?