Post job

7 jobs that use ACAS the most

Jobs that use acas the most include computer security specialist, information assurance analyst, and manager, information assurance.

What jobs use ACAS the most?

1. Computer Security Specialist

How computer security specialist uses ACAS:

  • Review and manage the security and information assurance capabilities of database applications, database structure and architecture.
  • Perform monthly IA evaluation of systems per DISA STIG guidance using approve DoD & DISA tools.
  • Conduct audits, analyze system security incidents, and recommend remediation efforts to meet DoD standards.

Most common skills for computer security specialist:

  • ACAS
  • FISMA
  • DOD
  • Security Policies
  • Linux
  • Incident Response

2. Information Assurance Analyst

How information assurance analyst uses ACAS:

  • Log analysis & managing the accuracy of DLP identification to lowering/avoiding false positives and negatives.
  • Monitor, detect and report vulnerability issues using ACAS scanner.
  • Used automated security scanning tools (ACAS) to identify potential vulnerabilities.

Most common skills for information assurance analyst:

  • RMF
  • DOD
  • ACAS
  • IAM
  • Windows
  • Security Policies

3. Manager, Information Assurance

How manager, information assurance uses ACAS:

  • Manage and monitors FISMA governance for all command accreditations.
  • Manage the provisioning of the hardware and software for virtual servers and personal computers.
  • Review and manage the security and information assurance capabilities of database applications, database structure and architecture.

Most common skills for manager, information assurance:

  • Risk Assessments
  • IAM
  • DOD
  • ACAS
  • NIST
  • RMF

4. Information Assurance Security Officer

How information assurance security officer uses ACAS:

  • Implement a manage endpoint encryption solution utilizing TrendMicro MobileArmor to secure university workstations against sensitive data loss.
  • Maintain HBSS systems and ACAS on SIPRNET and NIPRNET networks.
  • Utilize Nessus/SCAP scans in conjunction with STiG documentation to adhere with DISA compliance for system submission for ATO.

Most common skills for information assurance security officer:

  • Security Procedures
  • DOD
  • ACAS
  • IAM
  • Security Policies
  • System Security

5. Senior Information Assurance Engineer

How senior information assurance engineer uses ACAS:

  • Review and manage the security and information assurance capabilities of database applications, database structure and architecture.
  • Provide engineering support for all MHS regions regarding up-to-date DISA STIG.
  • Support DoD clients with application and software architecture assessments, risk analysis, and vulnerability assessments.

Most common skills for senior information assurance engineer:

  • RMF
  • NIST
  • DOD
  • ACAS
  • IAM
  • Infrastructure

6. Information Assurance

How information assurance uses ACAS:

  • Lead implementation for new DAR solution for global disk encryption, developing management policy to prevent document and data leakage.
  • Execute a cybersecurity program maturity assessment at a global food and beverage company (base on ISO 27001 and NIST frameworks )
  • Download and install IAVA patches.

Most common skills for information assurance:

  • DOD
  • RMF
  • NIST
  • Windows
  • ACAS
  • National Security

7. Information Assurance Engineer

How information assurance engineer uses ACAS:

  • Install, configure, and managing ACAS deployments to assess the current vulnerabilities and security posture for classify networks.
  • Implement a manage endpoint encryption solution utilizing TrendMicro MobileArmor to secure university workstations against sensitive data loss.
  • Review system security plans, risk assessments, and compliance with NIST minimal security controls.

Most common skills for information assurance engineer:

  • RMF
  • DOD
  • IAM
  • Windows
  • ACAS
  • Assurance Support

Other skills