Interested in finding more jobs in Church Road, VA? Click Here to create a Climber profile today!
Veredus Work Values
Interested in finding out if you are the type of person this company is looking for? Create an account and take our patented DNA assessment now to see how you compare.
Daily Duties at Veredus:
Managed and provided oversight for the certification, accreditation, and the risk management posture of systems located at the client environment. Managed the continuous monitoring program, which was comprised of identifying gaps, preparing a project plan with documented milestones, formulation of a team of vulnerability analysts, categorization and remediation of vulnerabilities, and lessons learned from the initial exercise. Managed a team of vulnerability analysts who performed the DIACAP 800.53 control set review to accredit new and reaccredit existing network infrastructure and applications, provided review of access requests to assigned systems. Also managedn the firewalls, scheduling maintenance, audit and compliance review of firewall rulesets. Managed the review of existing security architecture and recommendation of new/additional components to the existing security architecture to improve security posture of the network and defense-in-depth posture. Managed incident response as the team lead; documented the incident response procedure and executed as required. Implemented Netwitness for forensic analysis of incidents. Managed Identity Access Management, defining solution requirements and developing a solution architecture to solve business issues. Application prioritization, defining the various solution components, vendor analysis and proof-of-concepts. Also managed mobile device security; working in concert with Windows Administrators to develop group policy to appropriately address security concerns unique to mobile computing.
What they like about Veredus:
You give high priority to hiring firms with prestige. Market reputation and prestige of a firm may be determined through on-line research, and conversations with individuals working in your target industry. Note that firms "in the public eye" receive a great deal more critical publicity and attention than those operating with more anonymity. So as you assess your employment opportunities, be sure to seek out the positive aspects of the firm's reputation in addition to noting negative publicity the company may have received.
Tags
information security, information assurance, information security lead, Firewalls, NIST 800-53, NIST 800-37, DIACAP, CISSP, vulnerability assessment, Advanced Persistent Threat detection, web analytics
Skills
Highly developed soft skills, Project Manager, Highly developed security related technical skills, Firewall administrator (Cisco), Secret Clearance (Active), CISSP , Adept with new technologies and keeping up with current threats, Stephen Covey Highly Effective People training, Dale Carnegie , Lean Six Sigma, PMP in process
Information about Veredus
Company Rank: Not Available
Average length of employment : 0 years
Average salary of employees: $127,500
These are some of the questions we asked our climbers about their experiences with Veredus:
05| | ||
Were your performance expectations clearly communicated? | 0.0 |
|
Were you recognized for meeting or exceeding expectations? | 0.0 |
|
Did you feel like your personal contribution was important? | 0.0 |
|
Was your career path clearly outlined and discussed? | 0.0 |
03| | ||
I would recommend this as a place of employment. | 0.0 | |
I believe in the purpose of this organization. | 0.0 | |
I would work for this organization again. | 0.0 | |
I feel employees are fairly compensated. | 0.0 |
Climbers who worked at Veredus had these interests:
Books | |
---|---|
Science of Correct Thinking/Logic |
Book on Logic |
Change Yourself, Change Your Life |
Self help book |
How To Make Friends and Influence Others |
Self help book |
The Art of War |
Book on strategic warfare |
Out of the Crisis |
An appreciation of a system, understanding of variation, psychology and Epistemology, or a theory of knowledge.[5] |
Blogs | |
ISC2 Blog http://www.isc2.org |
SANS Institute |
Search Security http://searchsecurity.techtarget.com/ |
Security blog on latest infosec news |
Magazines | |
Information Security Magazine |
Magazine |
