Home security
 

Keywords :   


Tag: security

Support to cyber security implementation

2019-03-11 17:33:02| Space-careers.com Jobs RSS

Position Reference 028 You will have the opportunity to provide support in the implementation of activities defined in the GSA cyber security implementation plan. This task entail classified and unclassified documents, and entails PRS information. Tasks and Activities The scope of work will include For Vulnerability Tracking and Mitigation, the main tasks to be performed are Track lifecycle of known vulnerabilities Definition of vulnerability risk mitigations through operational measures Monitor implementation of operational mitigations performed by GSOp or other operators contracted by GSA Review evidences of Operational Mitigations performed by GSOp, and consolidate them for submission to SAB Accreditation Team Support GSA CSM in the preparation of Cyber Treatment meetings, Cyber Review Boards and any other relevant workshopsmeetings Report to GSA CSM and Provide support to the GSA CSM on any other tasks under its responsibility. For the Defensive Security Design, the main tasks to be performed are Maintain the security technical baseline policies, requirements, concepts of operations Perform and maintain traceability of the security technical baseline to mission requirements Support the CSM in the flow down of the security technical baseline in GSA procurement projects e.g. GSC, RLSP Manage and monitor the implementation of the security technical baseline in the GSA procurement projects Participate to project reviews, focusing on aspects related to the security technical baseline Report to GSA CSM and Provide support to the GSA CSM on any other tasks under its responsibility. For Cyber Internal Auditing, the main tasks to be performed are Audit processes and controls related to vulnerability management Audit implementation of operational mitigations and operational treatment plans in general Audit implementation of processes and controls related to cyber security governance in GSA Support the development of the GSA cyber audit plan Report to GSA CIA Provide support to the GSA CIA on any other tasks under its responsibility. Skills and Experience The following skills and experience are mandatory You have a Masters Degree in the relevant discipline. You have between 2 and 5 years of relevant experience. You have a background in cyber security. You are eligible for security clearance EU Secret already holding one would be preferable. You have a high level of proficiency in the English language at least C1 level. Knowledge in other European languages will be an asset. You have experience dealing with the drafting of risk reports and security advisories. How to Apply Looking to take your career to the next level? Interested applicants should submit their CV and Cover Letter to RHEAs Recruitment team at careersrheagroup.com no later than 22032019. Preference will be given to candidates eligible for an EU or national personal security clearance at the level of CONFIDENTIAL or above. About RHEA Group RHEA Group is a leading engineering consultancy firm with demonstrated expertise in space, system and secure software solutions. We attract skilled engineers, scientists and management professionals and offer a range of exciting career paths working alongside clients such as the European Space Agency, the European GNSS Agency, EUMETSAT and NATO.

Tags: support security implementation cyber

 

Cyber security round-up

2019-03-10 15:30:15| Oil IT Journal - www.oilit.com

TSA on pipeline security. New DHS CISA Act. NCCoE/NIST ICS cybersecutity demonstrator. Illusive pitches 'deceptions everywhere' approach. CERT's Cyobstract incident report tool. ClassNK and TUV Rheinland partner on offshore cybersecurity. Industrial Defender adds 'passive' network monitoring. Kaspersky's squeaky-clean Zurich data center.

Tags: security cyber roundup cyber security

 
 

Germany publishes additional security requirements for network operators before 5G auction

2019-03-08 09:33:00| Telecompaper Headlines

(Telecompaper) The requirements refer in particular to operators of public telecommunications networks with a high potential threat, the Agency said in a statement. The essential elements of the new security rules include the sourcing of systems only from trustworthy suppliers that follow national security regulations and provisions for the secrecy of telecommunications and for data protection, constantly monitoring the network traffic, the certification of security-related network and system components (critical key components) by the Federal Office for Information Security (BSI) and IT security checks by an approved testing body of the BSI. 

Tags: additional network germany security

 

Germany ignores US lobby on 5G security

2019-03-08 01:00:00| Total Telecom industry news

German telecoms regulator, the Bundesnetzagentur (BNetzA), has published a series of security requirements to govern the rollout of 5G in Europe's biggest economy.  The guidelines represent a tightening of security legislation around the country's telecommunications networks but resist US calls for a ban on Chinese network equipment provider…read more on TotalTele.com »

Tags: germany security lobby ignores

 

Facebook's 2FA 'Security' Practices Violate User Privacy

2019-03-05 19:56:58| TechNewsWorld

Facebook has undermined privacy on its network by exposing mobile phone numbers provided to secure user accounts through two-factor authentication. That's because anyone can use the numbers to look up a user's account. One doesn't even have to be a Facebook member to do so. Moreover, there's no way to opt out of the setting, although it can be limited to "friends" only.

Tags: privacy user security practices

 

Sites : [80] [81] [82] [83] [84] [85] [86] [87] [88] [89] [90] [91] [92] [93] [94] [95] [96] [97] [98] [99] next »