Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
Key Responsibilities:
* Analyze and define data requirements and specifications.
* Analyze and plan for anticipated changes in data capacity requirements.
* Develop data standards, policies, and procedures.
* Manage the compilation, cataloging, caching, distribution, and retrieval of data.
* Provide a managed flow of relevant information (via web-based portals or other means) based on mission requirements.
* Provide recommendations on new database technologies and architectures.
* Analyze data sources to provide actionable recommendations.
* Assess the validity of source data and subsequent findings.
* Collect metrics and trending data.
* Conduct hypothesis testing using statistical processes.
* Confer with systems analysts, engineers, programmers, and others to design applications.
* Develop and facilitate data-gathering methods.
* Develop strategic insights from large data sets.
* Present technical information to technical and nontechnical audiences.
* Present data in creative formats.
* Program custom algorithms.
* Provide actionable recommendations to critical stakeholders based on data analysis and findings.
* Utilize technical documentation or resources to implement a new mathematical, data science, or computer science method.
* Effectively allocate storage capacity in the design of data management systems.
* Read, interpret, write, modify, and execute simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems.
* Utilize different programming languages to write code, open files, read files, and write output to different files.
* Utilize open source language such as R and apply quantitative techniques.
* Develop and implement data mining and data warehousing programs.
Minimum Requirements:
* Knowledge of computer networking concepts and protocols, and network security methodologies.
* Knowledge of risk management processes.
* Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
* Knowledge of cybersecurity and privacy principles.
* Knowledge of cyber threats and vulnerabilities.
* Knowledge of specific operational impacts of cybersecurity lapses.
* Knowledge of computer algorithms.
* Knowledge of computer programming principles.
* Knowledge of data administration and data standardization policies.
* Knowledge of data mining and data warehousing principles.
* Knowledge of database management systems and query languages.
* Knowledge of digital rights management.
* Knowledge of enterprise messaging systems and associated software.
* Knowledge of low-level computer languages.
* Knowledge of mathematics.
* Knowledge of network access and identity management.
* Knowledge of operating systems.
* Knowledge of policy-based and risk adaptive access controls.
* Knowledge of programming language structures and logic.
* Knowledge of query languages such as SQL.
* Knowledge of the capabilities and functionality associated with various technologies for organizing and managing information.
* Knowledge of command-line tools.
* Knowledge of interpreted and compiled computer languages.
* Knowledge of secure coding techniques.
* Knowledge of advanced data remediation security features in databases.
* Knowledge of database access application programming interfaces.
* Knowledge of applications that can log errors and exceptions.
* Knowledge of how to utilize Hadoop, Java, Python, SQL, Hive, and Pig to explore data.
* Knowledge of machine learning theory and principles.
* Knowledge of Information Theory.
* Knowledge of database theory.
#J-18808-Ljbffr