Position: Senior Cyber Security Auditor

Report generated at: 2025-05-13 08:11:39

Analysis Method: NICE Framework Mapping

Analysis of position description: (Analysis generated using: claude)

Analysis Summary

The Senior Cyber Security Auditor conducts IT audits, risk assessments, and control reviews to evaluate business applications, processes, and systems. They analyze operations to identify improvements and ensure effectiveness of IT controls.

NICE Framework Analysis

Best Role Match

SP-RSK-002 - Cyber Defense Analyst
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.

Required Knowledge

K0001 - Knowledge of computer networking concepts and protocols, and network security methodologies
Knowledge of computer networking concepts and protocols, and network security methodologies.
Relevance: High
K0002 - Knowledge of risk management processes (e
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Relevance: High
K0003 - Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Relevance: Medium
K0004 - Knowledge of cybersecurity and privacy principles
Knowledge of cybersecurity and privacy principles.
Relevance: High
K0005 - Knowledge of cyber threats and vulnerabilities
Knowledge of cyber threats and vulnerabilities.
Relevance: High

Required Skills

S0085 - Skill in conducting audits or reviews of technical systems
Skill in conducting audits or reviews of technical systems.
Relevance: High
S0073 - Skill in using virtual machines
Skill in using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere, Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, etc.).
Relevance: Medium
S0066 - Skill in identifying gaps in technical capabilities
Skill in identifying gaps in technical capabilities.
Relevance: High
S0060 - Skill in writing code in a currently supported programming language (e
Skill in writing code in a currently supported programming language (e.g., Python, Java, C++, etc.).
Relevance: Low
S0367 - Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Relevance: High

Key Tasks

T0262 - Conduct reviews of the organization's cybersecurity and privacy policies and procedures for compliance with applicable laws, regulations, directives, policies, standards, and guidelines
Conduct reviews of the organization's cybersecurity and privacy policies and procedures for compliance with applicable laws, regulations, directives, policies, standards, and guidelines.
Relevance: High
T0206 - Assess the effectiveness of cybersecurity measures utilized by system(s)
Assess the effectiveness of cybersecurity measures utilized by system(s).
Relevance: High
T0207 - Assess threats and vulnerabilities to ascertain their potential impact on the organization
Assess threats and vulnerabilities to ascertain their potential impact on the organization.
Relevance: High
T0548 - Provide input to implementation plans and standard operating procedures as they relate to cybersecurity
Provide input to implementation plans and standard operating procedures as they relate to cybersecurity.
Relevance: Medium
T0229 - Assess the effectiveness of security controls
Assess the effectiveness of security controls.
Relevance: High

Original Position Description

Senior Cyber Security
Auditor (Audit Hiring
Event)
Department: Audit
Location:

Description
About the Role
The Audit Department is responsible for providing internal auditing services that include reviewing
business processes, systems, and operations, as well as examining tenants and contractor
records. Reporting to the Inspector General and the Board of Commissioners Audit Committee,
the Department's mission is to bring an independent, systematic, and disciplined approach to
evaluating and improving the effectiveness of internal control and risk management.
The Audit Department is looking for highly skilled individuals to join their team in support of the
mission - to enhance and defend the integrity of the Port Authority's programs and operations.
Reporting directly to the Manager the duties of this position are highly confidential and involve the
handling of sensitive documentation. The selected candidate is expected to maintain
confidentiality and discretion.

Generated by CHRIS (Cybersecurity Human Resource Intelligence System)

Relevant Clark Center Resources

Relevance Score System Explanation

Each resource is assigned a relevance score (0-1) based on:

Found 5 relevant resources with a relevance score above 0.30:

Course Professionalism & Soft Skills Development

Ethics in cyber is a hugely important step, but it isn’t the entire solution to developing a trusted and competent workforce. Professionalism is also critically important and much of the higher education community can improve how they prepare students for careers in the government and industry. Students need to be prepared to join the workforce with the skills required to present a professional image, including how to present themselves to senior leadership, communicate ideas effectively and succinctly and engage with multiple stakeholders from various backgrounds that hold various opinions of proper office standards. What might be acceptable at an IT company in Silicon Valley might be wholly inadequate for work in the NSA regarding dress, behavior, etc. This curriculum is designed to develop professionalism as part of preparing to enter the cybersecurity workforce.

Why this is relevant:
  • Strong match with NICE skill S0367
  • Strong match with NICE knowledge K0003
  • Strong match with NICE knowledge K0004
  • Good overall match with position description
Relevance Score: 0.53
Position Similarity
0.42
NICE Element Similarity
0.58
Combined score: 0.535 (Position: 0.423 × 0.3, NICE: 0.582 × 0.7) [Boosted from 0.000 due to multiple NICE element matches]
View in CLARK →
Network Security and DDoS Attacks

This is Module 4 in the Cybersecurity course, but the module could also be used independently.

Module topics: ARP, ARP poisoning, MAC address, DDoS attack, reflective DDoS attack with amplification. 

This module is intended for undergraduate students in information technology majors with a strong emphasis on “hands-on” learning. However, students may come from computer engineering, computer science, information technology or any related technical field, provided that students have practical knowledge of basic internet technologies (TCP/IP, ARP etc.), basic Windows administration, and basic Linux administration. This includes:
•    Client / Server concepts
•    Using the Linux command line interface
•    Installing Linux and Windows software
•    Configuring TCP/IP networking
•    Basic web programming
•    Basic SQL statement

Why this is relevant:
  • Strong match with NICE knowledge K0001
  • Moderate match with NICE knowledge K0005
  • Moderate match with NICE skill S0367
  • Moderate match with position description
Relevance Score: 0.48
Position Similarity
0.34
NICE Element Similarity
0.54
Combined score: 0.479 (Position: 0.345 × 0.3, NICE: 0.537 × 0.7) [Boosted from 0.000 due to multiple NICE element matches]
View in CLARK →
It's a Matter of National Security

Students will explain and understand risks and responsibilities of being a digital citizen.  Students will visit the National Cyber Security Centre to analyze attacks and threats conducted weekly. Students will explain how multi-factor authentication protects information from unauthorized users.   

Why this is relevant:
  • Strong match with NICE knowledge K0005
  • Strong match with NICE knowledge K0004
  • Moderate match with NICE skill S0367
  • Moderate match with position description
Relevance Score: 0.47
Position Similarity
0.35
NICE Element Similarity
0.52
Combined score: 0.471 (Position: 0.353 × 0.3, NICE: 0.522 × 0.7) [Boosted from 0.000 due to multiple NICE element matches]
View in CLARK →
Threat Detection and Prevention using AI

This learning object focuses on enhancing participants' expertise in AI-driven cybersecurity applications. Participants will delve into AI-powered malware and phishing detection, understand the strategic use of AI for knowledge consolidation, and learn to detect and prioritize new threats. The training will also cover leveraging AI for network traffic analysis and anomaly detection, providing a comprehensive understanding of how AI enhances cybersecurity defenses across different domains.

 

 

 

 

Why this is relevant:
  • Strong match with NICE knowledge K0005
  • Moderate match with NICE skill S0367
  • Moderate match with NICE knowledge K0004
  • Moderate match with position description
Relevance Score: 0.46
Position Similarity
0.35
NICE Element Similarity
0.50
Combined score: 0.459 (Position: 0.354 × 0.3, NICE: 0.504 × 0.7) [Boosted from 0.000 due to multiple NICE element matches]
View in CLARK →
Topic 4 Anti-Virus and Anti Malware

The lab modules will cover entry-level cybersecurity knowledge and skills that map to in-demand industry certifications (specifically, CompTIA Security+ and CISSP). The modules will also be mapped to the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. Existing high-quality materials will be adapted when possible, and the investigators will coordinate with others who are currently developing cybersecurity curricula to avoid duplications. An advisory board consisting of college, high school, business, military, and government experts will provide guidance on the topics, content, coverage, and flow of the modules.

Each module will consist (typically) of a set of PowerPoint slides, a list of Internet references, a written lab activity, assessment questions, application software, and mapping to industry certifications and the NICE Cybersecurity Workforce Framework.

For each content area, a beginning, intermediate, and advanced cybersecurity lab activity will be developed.

Drive Link: https://drive.google.com/drive/folders/1u2dE2WvxXNUJYQqQ460GmvtKcJepiK4f?usp=sharing

Why this is relevant:
  • Moderate match with NICE knowledge K0005
  • Moderate match with NICE knowledge K0001
  • Moderate match with NICE task T0206
  • Good overall match with position description
Relevance Score: 0.45
Position Similarity
0.42
NICE Element Similarity
0.47
Combined score: 0.453 (Position: 0.417 × 0.3, NICE: 0.468 × 0.7) [Boosted from 0.000 due to multiple NICE element matches]
View in CLARK →