05:18 PM
Connect Directly

DHS Seeks Private-Sector Cybersecurity Expert

The agency is looking to borrow a cybersecurity expert from the private section for a six-months position as part of an exchange program with companies to share expertise and knowledge.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters

The Department of Homeland Security (DHS) is seeking a cybersecurity expert as part of an exchange program with the private sector to share information and knowledge about technology and other areas of expertise.

The DHS Office of Cybersecurity and Communications (OCSC) Office of Strategic Plans has a six-month assignment open for someone to serve as a senior advisor for strategy development and implementation, reporting to the deputy assistant secretary for policy. The position has an option for a six-month renewal and is located in the Washington D.C. area.

The position is aimed at "providing feedback regarding the development and implementation of mission-based strategies and capabilities for use in the department's planning, programming, budget, and execution processes," according to a a DHS blog post.

The adviser also will provide independent and critical assessment of the strategic, mission, and operational plans, according to a broader IT reform plan unveiled in December.

Indeed, the federal government has cozied up considerably to the private sector in the area of cybersecurity, partnering with it in a variety of ways to improve the security of U.S. critical infrastructure, which is largely owned by private companies.

This week a coalition of industry groups and the U.S. Chamber of Commerce made recommendations for how the administration can improve the private-public partnership, suggesting financial incentives for companies to improve cybersecurity and develop standards for it.

The other open position is also in the Office of Strategic Plans and calls for a senior adviser for strategy development and implementation to help guide the department's long-term strategic direction. The deadline to apply for both positions is March 21.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.