Author name: Bruce

I have been doing IT and Cybersecurity specifically GRC for 20 years. I want to help people get into this field.

Uncategorized

STIG Update – DISA has released the following IAVM packages

STIG Update – DISA has released the following IAVM packages DISA has released the following IAVM packages: http://iase.disa.mil/stigs/Pages/iavm.aspx AIX 6.1 Ver 1, Rel 22 Apple OS 10.10 Workstation Ver 1, Rel 11 Apple OS 10.8 Workstation Ver 1, Rel 15 Apple OS 10.9 Workstation Ver 1, Rel 12 BlackBerry 10 OS Ver 1, Rel 13 Cisco IOS Ver 1, Rel 13 HP-UX 11.31 Ver 1, Rel 22 MAC OS X 10.6 Ver 1, Rel 22 Oracle Linux 5 Ver 1, Rel 15 Oracle Linux 6 Ver 1, Rel 15 RHEL 5 Ver 1, Rel 22 RHEL 6 Ver 1, Rel 20 Solaris 10 SPARC Ver 1, Rel 22 Solaris 10 x86 Ver 1, Rel 22 Solaris 11 SPARC Ver 1, Rel 15 Solaris 11 x86 Ver 1, Rel 15 Windows 7 Ver 1, Rel 20 Windows 8 and 8-1 Ver 1, Rel 20 Windows 2008 R2 Ver 1, Rel 20 Windows 2008 Ver 1, Rel 20 Windows 10 Ver 1, Rel 6 Windows 2012 and 2012 R2 Ver 1, Rel 18 Windows Vista Ver 1, Rel 20 zOS Ver 6, Rel 27 For all STIG related questions, please contact the DISA STIG Customer Support Desk: disa.stig_spt@mail.mil

Uncategorized

STIG Update – DISA has released the Microsoft SQL Server 2014 STIG Version 1

STIG Update – DISA has released the Microsoft SQL Server 2014 STIG Version 1 DISA has released the Microsoft SQL Server 2014 STIG Version 1. The requirements of the STIG become effective immediately.  The STIG is available on IASE at http://iase.disa.mil/stigs/app-security/database/Pages/sql.aspx For all STIG related questions, please contact the DISA STIG Customer Support Desk:  disa.stig_spt@mail.mil

Uncategorized

DISA has released the A10 Networks Application Delivery Controller (ADC) STIG Version 1

DISA has released the A10 Networks Application Delivery Controller (ADC) STIG Version 1. The requirements of the STIG become effective immediately.  The STIG is available at http://iase.disa.mil/stigs/net_perimeter/network-infrastructure/Pages/other.aspx. For all STIG related questions, please contact the DISA STIG Customer Support Desk: disa.stig_spt@mail.mil

Uncategorized

SSCP or Security plus or CISSP

Should you do the SSCP, Security+ or CISSP? I would say it depends. The Security+ is a great certification. It is accepted by the industry by public and private organizations. But it is NOT going to prepare you for the CISSP. Probably the SSCP is better for a CISSP preparation. From: Ivoire Rienna Love your videos, and thank you for your humility. Lol, I know few people who have this CISSP certification, and they feel like they are a Greek god or something.Ok, here is my question: Right now I am pursuing an MS in Information Technology with minor in Data Privacy and Security, and would like to add to that a certification, but I am confused and need your help please. I really don’t want to take the Security+ certification, but instead would like to start with the SSCP certification. What do you think about that? Also, what do you think of the CEH (Certified Ethical Hacker) certification? Thank YOU!  

Uncategorized

Attend the (ISC)² SecureDenver Event on June 17

Threat Intelligence – From Haystacks to Needles Information Security, as a function, sits at a great confluence of raw unfiltered data; perhaps more data about the enterprise than any other function of the organization. From state-based data such as vulnerability scan results, to event-based data such as IDS logs, we are collecting more and more information about the enterprise every passing day. The next step is to make sense of this treasure trove of data. To find the nuggets of truth and transform them into useful information. Date: June 17, 2016 Registration: 8:00 a.m. Time: 9:00 a.m.–5:00 p.m. Venue: Marriott Denver South 10345 Park Meadows Littleton, Colorado 80124 USA Registration Fee: $99 For full program, speaker information, and registration, click here.

Uncategorized

Full Time Position Immediate Interview Need Network Technician location Gunter AFB Montgomery, AL with Air Force

Conduct network security monitoring and intrusion detection analysis for the NIPRNet and SIPRNet using the AF’s selected IDS/IPS toolset -  Research NIPR and SIPR defensive cyber operations events to determine the necessity for deeper analysis and conduct an initial assessment of type and extent of intruder activities. -  Enter event data into mission support systems according to operational procedures and reports through the 33rd operational chain. -  Record suspicious events, meeting established thresholds, into the operational database for suspicious traffic. Records shall contain sufficient information to stimulate future research of suspicious traffic. The record shall answer the: who, what, where, why and when for this suspicious activity. -  Provide computer security-related assistance to Air Force field units (example: the Integrated Network Operations and Security Center (INOSC), Base Information Assurance shop) in countering vulnerabilities, minimizing risk, and improving the security posture of AF computer networks and systems within the scope of operational requirements and mission execution. BASIC QUALIFICATIONS: -  Intermediate knowledge with one or more of the IDS/IPS systems currently in use by the Department of Defense (DoD), Services, and Agencies (i.e., AF, Navy, Army, DC3, DISA) or Federal Government and intermediate experience in the following areas: EDUCATION REQUIREMENTS: -  One or more of the following IAT Level II Certifications (GSEC, Security +, SSCP, CCNA-Security) -  CND Certification (GCIA, CEH, GCIH). Thanks & Regards, Harpal Singh Technical Recruiter 22nd Century Technologies Inc. (TSCTI) 8(a) / SDB | CMMI level 3 Certified Direct: 1-908-765-0003 Ext: 315

Uncategorized

STIG Update – DISA has released the Oracle Java Runtime Environment (JRE) 8 STIG Version 1

DISA has released the Oracle Java Runtime Environment (JRE) 8 STIG Version 1. The requirements of the STIG become effective immediately.  The STIG is available athttp://iase.disa.mil/stigs/app-security/app-security/Pages/index.aspx. For all STIG related questions, please contact the DISA STIG Customer Support Desk:disa.stig_spt@mail.mil Update your subscriptions, modify your password or e-mail address, or stop subscriptions at any time on your Subscriber Preferences Page. You will need to use your email address to log in. If you have questions or problems with the subscription service, please visitsubscriberhelp.govdelivery.com. All other inquiries can be directed to subscriptions@disa.mil.  

Uncategorized

Need Help Desk Specialist in Honolulu, HI with US Army

Job title :Help Desk Specialist Location: Honolulu, HI Client : US Army CLEARANCE: SECRET Description The contractor shall provide service execution to CLIN conversion within two (2) business days. The contractor shall provide service management to EITSMS processing within one (1) business day. Contractor will implement and operate an IT Infrastructure Library (ITIL)-based service desk to provide the HQ a single assured point of contact for all Automated Data Processing (ADP) hardware, software, and networking problems; for service requests, to include new systems, major modifications to existing systems and entry points for emerging technologies. Also maintains service catalogs, an approved product list, and a knowledge base for Service Desk operations. Adhere to HQs policy of using Information Technology Requests for all maintenance requests. Documents all users’ trouble calls and coordinates all software maintenance changes with government leads while ensuring project maintenance logs are maintained and reviewed. Special Qualifications: experience using Microsoft Office tools (Word, PowerPoint, Excel, and Outlook) Security+ Certification Thanks & Regards, Kartik Jain Technical Recruiter Direct : 908-765-0002 Ext: 388

Uncategorized

Need Information Systems Security Officer in Herndon, VA

Information Systems Security Officer Location: Herndon, VA Duration: 1 year US Citizenship Required –  Public Trust or Secret Clearance Tier III Summary• Advises key technical personnel of system regarding design, engineering and compliance requirements • Advises key stakeholders of security posture and risks associated with the system • Reviews configurations changes for the system and the impact of changes • Creates, manages and facilitates NIST based security documentation and controls • Identifies, manages and facilitates remediation of security weaknesses Job Responsibilities/ Duties: • Develop, consult, implement controls and documentation for the security of the system. This includes: outlining system operating environment, overall mission, physical diagrams, hardware and software inventories, configuration management, type of data processed, user organizations, security classifications, operating modes, interconnections to other systems/networks, security personnel, and other associated responsibilities. • Oversee, develop, improve and maintain the overall security posture of the system; that includes: Information System Security Plans, Risk Ratings, Contingency Plans, Security Assessments, and Contingency Plan Tests and other associated documentation. • Participate in the development or revision of security controls of the system and local operating procedures that are based upon regulatory, policy and industry requirements. • Act as a consultant to system owners for the security of the system and system documentation. For example, security incident reports, equipment/software inventories, operating instructions, technical vulnerability reports, and contingency plans • Provide expertise in classified and unclassified ratings to customers. • Work closely with technical teams for successful Certification & Accreditation of the system that leads to ATO • Attend ISSO training courses and sessions as required • Perform interpretations of monthly vulnerability scan results of assigned systems Required Training: Senior Level IT Security Certifications (CCDP, CCNP Security, CISSP, CISM, etc.) Education/Equivalent Training Required: Bachelor’s Degree or equivalent experience will be evaluated Unique/Additional /Experience (Position Specifics): Expert knowledge of FISMA and NIST Special Publications Experience implementing, assessing and managing security controls for federal IT systems Expert knowledge of IT security best practices Expert knowledge of current IT security threats Broad knowledge of IT technologies and operations Ability to develop good working relationships with customers, colleagues and other stakeholders. Excellent verbal and written communication skills Ability to handle and prioritize multiple simultaneous systems, projects and other assignments. Experience leading information security teams Knowledge of HIPAA, FedRAMP, PCI, ISO and other standards Location(s): District of Columbia (Metro Area), Department: IT Security Keywords: Certification and Accreditation, C&A, A&A, SA&A, FISMA, compliance, information assurance, ISSO, AISO, ISO, IASO and ISSM Comments: US Citizen, US Government Suitability Determination and DoE Q Security Clearance is a Plus Thanks & Regards, Kartik Jain Technical Recruiter Direct : 908-765-0002 Ext: 388

Uncategorized

STIG Update – DISA has approved the signed Cloud Computing Security Requirements Guide v1r2 for public release

DISA has approved the signed Cloud Computing Security Requirements Guide v1r2 for public release. The requirements in this SRG become effective immediately except for those CSPs currently being assessed under v1r1.  The SRG is available on IASE at:http://iase.disa.mil/cloud_security/Pages/index.aspx DoD Cloud computing policy and the CC SRG is constantly evolving based on lessons learned with respect to the authorization of Cloud Service Offerings and their use by DoD Components. As such the CC SRG is following an “Agile Policy Development” strategy and will be updated quickly when necessary. In support of this strategy, DISA is offering a continuous public review option by accepting comments on the current version of the CC SRG at any time. Please use the comment matrix posted along with the SRG.  We would appreciate it if your comments are limited to critical issues and omissions or recommended coverage topics. Submit all comment matrices and questions to disa.stig_spt@mail.mil For all STIG related questions, please contact the DISA STIG Customer Support Desk:disa.stig_spt@mail.mil

Scroll to Top