Analysis Method: NICE Framework Mapping
Analysis of position description: (Analysis generated using: claude)
The Senior Cyber Security Auditor conducts IT audits, risk assessments, and control reviews to evaluate business applications, processes, and systems. They analyze operations to identify improvements and ensure effectiveness of IT controls.
Senior Cyber Security
Auditor (Audit Hiring
Event)
Department: Audit
Location:
Description
About the Role
The Audit Department is responsible for providing internal auditing services that include reviewing
business processes, systems, and operations, as well as examining tenants and contractor
records. Reporting to the Inspector General and the Board of Commissioners Audit Committee,
the Department's mission is to bring an independent, systematic, and disciplined approach to
evaluating and improving the effectiveness of internal control and risk management.
The Audit Department is looking for highly skilled individuals to join their team in support of the
mission - to enhance and defend the integrity of the Port Authority's programs and operations.
Reporting directly to the Manager the duties of this position are highly confidential and involve the
handling of sensitive documentation. The selected candidate is expected to maintain
confidentiality and discretion.
Generated by CHRIS (Cybersecurity Human Resource Intelligence System)
Each resource is assigned a relevance score (0-1) based on:
Found 5 relevant resources with a relevance score above 0.30:
Ethics in cyber is a hugely important step, but it isn’t the entire solution to developing a trusted and competent workforce. Professionalism is also critically important and much of the higher education community can improve how they prepare students for careers in the government and industry. Students need to be prepared to join the workforce with the skills required to present a professional image, including how to present themselves to senior leadership, communicate ideas effectively and succinctly and engage with multiple stakeholders from various backgrounds that hold various opinions of proper office standards. What might be acceptable at an IT company in Silicon Valley might be wholly inadequate for work in the NSA regarding dress, behavior, etc. This curriculum is designed to develop professionalism as part of preparing to enter the cybersecurity workforce.
This is Module 4 in the Cybersecurity course, but the module could also be used independently.
Module topics: ARP, ARP poisoning, MAC address, DDoS attack, reflective DDoS attack with amplification.
This module is intended for undergraduate students in information technology majors with a strong emphasis on “hands-on” learning. However, students may come from computer engineering, computer science, information technology or any related technical field, provided that students have practical knowledge of basic internet technologies (TCP/IP, ARP etc.), basic Windows administration, and basic Linux administration. This includes:
• Client / Server concepts
• Using the Linux command line interface
• Installing Linux and Windows software
• Configuring TCP/IP networking
• Basic web programming
• Basic SQL statement
Students will explain and understand risks and responsibilities of being a digital citizen. Students will visit the National Cyber Security Centre to analyze attacks and threats conducted weekly. Students will explain how multi-factor authentication protects information from unauthorized users.
This learning object focuses on enhancing participants' expertise in AI-driven cybersecurity applications. Participants will delve into AI-powered malware and phishing detection, understand the strategic use of AI for knowledge consolidation, and learn to detect and prioritize new threats. The training will also cover leveraging AI for network traffic analysis and anomaly detection, providing a comprehensive understanding of how AI enhances cybersecurity defenses across different domains.
The lab modules will cover entry-level cybersecurity knowledge and skills that map to in-demand industry certifications (specifically, CompTIA Security+ and CISSP). The modules will also be mapped to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. Existing high-quality materials will be adapted when possible, and the investigators will coordinate with others who are currently developing cybersecurity curricula to avoid duplications. An advisory board consisting of college, high school, business, military, and government experts will provide guidance on the topics, content, coverage, and flow of the modules.
Each module will consist (typically) of a set of PowerPoint slides, a list of Internet references, a written lab activity, assessment questions, application software, and mapping to industry certifications and the NICE Cybersecurity Workforce Framework.
For each content area, a beginning, intermediate, and advanced cybersecurity lab activity will be developed.
Drive Link: https://drive.google.com/drive/folders/1u2dE2WvxXNUJYQqQ460GmvtKcJepiK4f?usp=sharing