05:18 PM

DHS Seeks Private-Sector Cybersecurity Expert

The agency is looking to borrow a cybersecurity expert from the private section for a six-months position as part of an exchange program with companies to share expertise and knowledge.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters

The Department of Homeland Security (DHS) is seeking a cybersecurity expert as part of an exchange program with the private sector to share information and knowledge about technology and other areas of expertise.

The DHS Office of Cybersecurity and Communications (OCSC) Office of Strategic Plans has a six-month assignment open for someone to serve as a senior advisor for strategy development and implementation, reporting to the deputy assistant secretary for policy. The position has an option for a six-month renewal and is located in the Washington D.C. area.

The position is aimed at "providing feedback regarding the development and implementation of mission-based strategies and capabilities for use in the department's planning, programming, budget, and execution processes," according to a a DHS blog post.

The adviser also will provide independent and critical assessment of the strategic, mission, and operational plans, according to a broader IT reform plan unveiled in December.

Indeed, the federal government has cozied up considerably to the private sector in the area of cybersecurity, partnering with it in a variety of ways to improve the security of U.S. critical infrastructure, which is largely owned by private companies.

This week a coalition of industry groups and the U.S. Chamber of Commerce made recommendations for how the administration can improve the private-public partnership, suggesting financial incentives for companies to improve cybersecurity and develop standards for it.

The other open position is also in the Office of Strategic Plans and calls for a senior adviser for strategy development and implementation to help guide the department's long-term strategic direction. The deadline to apply for both positions is March 21.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

Published: 2015-03-30
The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.