WASHINGTON, DC, 20080, USA
9 hours ago
Cybersecurity Sensoring-Monitoring Control Systems Cybersecurity Consultant_Mid
**Introduction** A Security Consultant within Cyber Strategy & Risk specializes in implementing security solutions for clients and stakeholders, while addressing security, regulatory, risk, and compliance issues. They maintain a current understanding of industry trends and hold multiple certifications in key cyber security areas. As a trusted advisor, they lead in identifying risks and developing mitigation plans, and define business-driven security strategies and roadmaps. This role requires a professional who can effectively communicate and collaborate with various stakeholders to ensure the successful implementation of security initiatives and the achievement of business objectives. **Your role and responsibilities** The Sensoring & Monitoring Control Systems Cybersecurity Consultant will leverage 3-5 years of experience to support Air Force Defensive Cyber Operations (DCO) by integrating threat intelligence, overseeing sensor deployments (IDCS, VOLTRN+), and driving dashboard-based analytics. Acting as a technical liaison to DCO teams, this mid-tier consultant will translate incoming threatdata into actionable intelligence, manage the health and effectiveness of monitoring sensors, and ensure personnel roles and certifications align with evolving threat-monitoring requirements. The role demands strong analytical acumen, hands-on familiaritywith security sensor platforms, and clear communication with both technical operators and senior leadership. • Threat Intelligence Integration (25%) Ingest, normalize, and enrich external and internal threat feeds; ensure DCO tools are updated with actionable IOCs/IOAs. • Sensor Operations Management (25%) Oversee the configuration, deployment, and day-to-day health of IDCS and VOLTRN+ sensor platforms; tune detection rules. • Dashboard Development & Analytics (20%) Design and maintain real-time dashboards for monitoring sensor outputs, trending key metrics, and alert volumes. • Liaison & Reporting (15%) Serve as the point of contact between sensor teams and DCO operators; prepare and deliver concise reports and briefings on sensor effectiveness and threat posture. • Workforce Certification Alignment (15%) Assess sensor-monitoring roles against DoD certification requirements, recommend training/certification paths, and track compliance. **Required technical and professional expertise** • Threat Intelligence Integration - Hands-on experience ingesting and normalizing threat feeds (e.g., STIX/TAXII) into operational environments • Sensor Deployment & Management - 3-5 years configuring, deploying, and tuning cybersecurity sensors such as IDCS and VOLTRN• Dashboard Analytics & Visualization - Building and maintaining real-time threat dashboards (e.g., Splunk, ELK, or similar platforms) • Defensive Cyber Operations Support - Collaborating with DCO teams to translate intelligence into incident-detection and response actions • Control Systems Security - Understanding of OT/ICS network protocols and how sensor data maps to control-system assets • Stakeholder Communication - Preparing and presenting technical briefings and reports to both operators and senior leaders • Compliance & Certification Alignment - Familiarity with workforce certification frameworks (e.g., DoD IAM, CSSP) and mapping roles to sensor-monitoring requirements • Analytical Troubleshooting - Investigating sensor alerts, diagnosing false positives, and refining detection rules Must have Secret Security Clearance **Preferred technical and professional experience** • Advanced Threat Hunting - Developing hypotheses, performing IOC/IOA searches, and leveraging automated tools for proactive detection • Scripting & Automation - Using Python, PowerShell, or similar to automate sensor health checks, alert triage, and report generation • Cloud-Based Monitoring - Experience integrating IDCS/VOLTRN+ or equivalent sensors with AWS/Azure security monitoring services • Machine-Learning Applications - Applying basic ML techniques to identify anomalous patterns in OT/ICS telemetry • Data Fusion & Correlation - Aggregating multiple sensor feeds and external intelligence sources to enrich detection capability • Incident Response Coordination - Participating in playbook development and after-action reviews for sensor-generated alerts • GRC Tool Familiarity - Populating eMASS or equivalent systems with sensor-monitoring control evidence IBM is committed to creating a diverse environment and is proud to be an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, caste, genetics, pregnancy, disability, neurodivergence, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
Por favor confirme su dirección de correo electrónico: Send Email