Job Directory Info. Security Analyst Advisor

Info. Security Analyst Advisor
Fort Belvoir, VA

Companies like
are looking for tech talent like you.

On Hired, employers apply to you with up-front salaries.
Sign up to start matching for free.

About

Job Description

Job Description

General Summary:

GDIT is seeking candidates to support the US Army Intelligence and Security Command (INSCOM). Under the I2TS 3 task order, INSCOM ensures reliable, uninterrupted availability of Command, Control, Communications, Computers, and Information Management (C4IM) including: networks, hardware, software, engineering, and specialized tools at the point of customer need to support INSCOM's mission. INSCOM and its MSCs provide the enabling layer to connect the Army and its tactical formations to defense and national intelligence agencies via tactical networks. The ability to provide mission critical intelligence is dependent on the successful use of its information technology (IT) networks worldwide.

Principal Duties and Responsibilities:

As I2TS 3 Cyber Security Officer will:

* Plan and coordinate the IT security programs and policies. Manage and control changes to the system and assessing the security impact of those changes. Manage and control changes to the system and assessing the security impact of those changes. Obtain C&A for systems under their purview. Provide support for a program, organization, system, or enclave's information assurance program. Serve as the Approval Authority for systems under their control
* Ensure that the architecture and design of DoD information systems are functional and secure
* As needed, design and develop IA or IA enabled products, interface specifications, and approaches to secure the environment
* Assess threats to the environment
* Develop and update the system security plan and other IA documentation
* Provide inputs on the adequacy of security designs and architectures
* Participate in risk assessment during the certification and accreditation process
* Provide support for a program, organization, system or enclave's information assurance program
* Provide security certification test and evaluation of assets, vulnerability management and response, security assessments, and customer support
* Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies
* Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed
* Assist with the management of security aspects of the information system and performs day-to-day security operations of the system
* Evaluate security solutions to ensure they meet security requirements for processing classified information
* Provide configuration management (CM) for information system security software, hardware, and firmware
* Prepare documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and Systems Requirements Traceability Matrices (SRTMs)
* Provide support to the Information Systems Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
* Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
* Provide CM for security- relevant information system software, hardware, and firmware
* Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
* Develop system security policy and ensures compliance. Administer the user identification and authentication mechanism of the information systems

Desirable Skills / Experience:

* Possess working knowledge of Assessment and Authorization practices within DoDI8510.01, ICD 503, CNSSI 1253, and the Risk Management Framework (RMF) process including various security tools (ACAS, HBSS, etc).
* Knowledge of data security administration principles, methods, and techniques
* Familiarity with domain structures, user authentication, and digital signatures
* Understanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policies

Education Required:

* High School Diploma/GED with 8 years of related experience, or Associate's Degree with 6 years of experience, or Bachelor's Degree with 4 years of experience

Certification(s):

* DoD 8570.01-M IAT or IAM Level II Computing Environment (CE) Certification as determined by the Program Manager is required prior to support on contract
* Computer Environment Certification: CASP CE, CISSP, or equivalent

Security Clearance:

* TS/SCI required

Additional:

* Candidates must be willing and able to attain a CI Polygraph for certain positions as determined by the contract

Education

High School Diploma/GED with 8 years of related experience, or Associate's Degree with 6 years of experience, or Bachelor's Degree with 4 years of experience

Qualifications

High School Diploma/GED with 8 years of related experience, or Associate's Degree with 6 years of experience, or Bachelor's Degree with 4 years of experience

For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class. #DefenseCampFtBelvoir #DPOST #CJPOST

Let your dream job find you.

Sign up to start matching with top companies. It’s fast and free.