Risk
3/9/2011
05:18 PM
50%
50%

DHS Seeks Private-Sector Cybersecurity Expert

The agency is looking to borrow a cybersecurity expert from the private section for a six-months position as part of an exchange program with companies to share expertise and knowledge.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters

The Department of Homeland Security (DHS) is seeking a cybersecurity expert as part of an exchange program with the private sector to share information and knowledge about technology and other areas of expertise.

The DHS Office of Cybersecurity and Communications (OCSC) Office of Strategic Plans has a six-month assignment open for someone to serve as a senior advisor for strategy development and implementation, reporting to the deputy assistant secretary for policy. The position has an option for a six-month renewal and is located in the Washington D.C. area.

The position is aimed at "providing feedback regarding the development and implementation of mission-based strategies and capabilities for use in the department's planning, programming, budget, and execution processes," according to a a DHS blog post.

The adviser also will provide independent and critical assessment of the strategic, mission, and operational plans, according to a broader IT reform plan unveiled in December.

Indeed, the federal government has cozied up considerably to the private sector in the area of cybersecurity, partnering with it in a variety of ways to improve the security of U.S. critical infrastructure, which is largely owned by private companies.

This week a coalition of industry groups and the U.S. Chamber of Commerce made recommendations for how the administration can improve the private-public partnership, suggesting financial incentives for companies to improve cybersecurity and develop standards for it.

The other open position is also in the Office of Strategic Plans and calls for a senior adviser for strategy development and implementation to help guide the department's long-term strategic direction. The deadline to apply for both positions is March 21.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9605
Published: 2015-09-04
WebUpgrade in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and create a system backup tarball, restart the server, or stop the filters on the server via a ' (single quote) character in the login and password parameters to webup...

CVE-2015-5612
Published: 2015-09-04
Cross-site scripting (XSS) vulnerability in October CMS build 271 and earlier allows remote attackers to inject arbitrary web script or HTML via the caption tag of a profile image.

CVE-2015-5688
Published: 2015-09-04
Directory traversal vulnerability in lib/app/index.js in Geddy before 13.0.8 for Node.js allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI.

CVE-2015-6807
Published: 2015-09-04
Cross-site scripting (XSS) vulnerability in the Mass Contact module 6.x-1.x before 6.x-1.6 and 7.x-1.x before 7.x-1.1 for Drupal allows remote authenticated users with the "administer mass contact" permission to inject arbitrary web script or HTML via a category label.

CVE-2015-6808
Published: 2015-09-04
Cross-site scripting (XSS) vulnerability in the Spotlight module 7.x-1.x before 7.x-1.5 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via a node title.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.