In this role, you will apply your understanding of computer security, military system specifications, and Department of Defense Information Assurance (DoD) (IA) policies, in the execution of all aspects of the systems and their Cybersecurity posture. You would be responsible for DoD Information Assurance Risk Management Framework (DIARMF), and the implementation of Cyber Security and IA boundary defense techniques, various IA-enabled network technologies and appliances to facilitate certification and security engineering tasks in support of the customer.
You will partner with IT Security Analysts and Enterprise Architects to establish, understand, and adhere to technical and IT security standards. Involved in all aspects of the technology life-cycle to ensure that non-functional and functional requirements are adhered to in design and build so solutions are stable, secure, resilient, and perform well.
As the a senior computer security analyst, this position will be responsible to plan, develop, and execute automated and manual tests to validate security posture/controls in accordance with DOD 8500.2/8510.01. This position will work directly with teams that support DoD Information Assurance Certification and Accreditation (DIACAP) and Risk Management Framework (RMF). The candidate will analyze current documents, and provide detailed reports. The candidate will assist the government with input, instructions, and guidance as needed for the creation of adequate package documentation and artifacts. The candidate will review test plans and procedures to ensure the test plan addresses the correct level of effort and is sufficiently comprehensive to validate all IA requirements applicable to the IT system or site being assessed and accredited. The candidate shall evaluate IA discrepancies and recommend mitigation measures for reducing or eliminating specific risk items. The candidate may also be tasked to engage the JSP CA Liaisons, SCA Reviewers, and ISSMs to discuss and obtain mitigation guidance. Further, the candidate will author DoD IA Assessment and Authorization artifacts, document a system from an IA perspective using Microsoft Office including MS Visio, MS Word, MS Excel and other appropriate tools. Candidate must display and convey an understanding of computer security, military system specifications, DoD IA policies and the ability to communicate clearly and succinctly in written and oral presentations.
Work under general supervision to provide Cybersecurity engineering documentation services to build secure technical documentation for applications, systems, architectures, and infrastructure that are operationally viable and efficient. Assist with leveraging security policies and procedures to protect the organization’s systems and information while enabling achievement of organization’s objectives. Update and maintain core enterprise lifecycle documents, including system security plan, security assessment plan and report, contingency plan, standard operating procedures, remediation plans, and configuration management plan.
Job Duties and Responsibilities;
You may be asked to:
- Provide patches and updates to all BIG IP/F5s in enterprise environment
- Perform necessary inspections and verification of security settings on BIG IP/F5 equipment (perform Secure Technical Implementation Guide) STIGs
- Author DoD IA Assessment and Authorization (A&A) artifacts.
- Document a system from an IA perspective
- Derive, document and/or identify system CONOPS for Mission Assurance Categorization per DoDI 8500.2
- Lead the research, recommend and document logical and physical solutions that prevent, detect and correct the system to be certified and accredited
- Research and apply DISA Security Technical Implementation Guides (STIGs) and NSA recommendations
- Lead the identification of disagreements between as built specifications, security requirements and DoD security policies and design implementations to bring the system into compliance.
- Plan, develop, execute and document results of security test procedures
- Lead the preparation and execution an Information Assurance Vulnerability Management (IAVM) Plan
- Lead the preparation and production of a System Security Plan (SSP)
- Lead the preparation of a Plan Of Action and Milestones (POA&M)
- Lead the technical support effort in identifying and specifying requirements and performing risk assessments
- Lead or Develop Standard Operating Procedures (SOP)
- Ensure IT solutions meet requirements for security, availability, capacity, resiliency, and performance in a way that is efficient and supportable, reducing overall support costs
- Understand industry leading solutions and trends for assigned technologies and applying those as appropriate
- Understand business needs and partnering with appropriate IT counterparts to recommend technology solutions
- Establish and maintain an IT multi-year strategy with a focus on continuous improvement. Create and maintain solutions architecture artifacts and other strategy and system documentation
- Use tools such as Host Based Security System (HBSS), Assured Compliance Assessment Solution (ACAS), Junos Space, Cisco Prime and Cisco Adaptive Security Appliance
- Bachelors Degree in Computer Science or a related technical discipline a
- Four (4) years' experience (in addition to minimum experience requirements) may be substituted for a Bachelor's degree.
- A Master's degree may be substituted for two (2) years' experience; or a doctoral degree may be substituted for three (3) years' experience.
- Active Secret clearance(minimum)
- Computing environment certification. (Examples – MCSE Server 2012, MCSA Server 2012, MCSE Productivity, Linux+, RHCSA, RHCE, RHCSS, LPIC-1, LPIC-2, Novell Certified Linux Engineer, Oracle Solaris System Administrator (OCA, OCP or OCF), GCUX, BSDA, CSE – Specialty in Networking and Security – HP-UX, etc.)
- Minimum of IAT or IAM Level II DoD certification.
- 4 years of experience in information technology, required
- 1 year lead experience in information technology, required
- Experience with computer networking and telecommunication architecture, the OSI model, and communications protocols
- Experienced in collaborating with multiple technical teams to drive solutions that requirement driven
- Experienced in organizing and coordinating deployments of complex systems
- Experienced with OS Tier 2 Support in heterogeneous operating system environments (Linux, Windows)
- A working knowledge of deployment methodologies and tooling
- Experience with DoD Certification and Accreditation (C&A) process, DoD Authorization & Accreditation including familiarity with Risk Management Framework (RMF) and the process to obtain an Authority to Operate (ATO)
- Strong English communication skills with ability to communicate clearly and succinctly in written and oral presentations
- Department of Defense Security Clearance of TS/SCI.
- Knowledge of multiple database architectures: Cisco, Oracle, Linux, Windows, and VMWare
Preferred experience in coordination of:
- Management Networks
- Out Of Band Management
- Joint Regional Security Stack (JRSS) implementation
- Production Monitoring Environments
- Experience in ITIL framework
- Experience with conducting internal security reviews/audits of responsible government systems
- Ability to work with technical subject matter experts, including hardware and software designers, operations personnel, and test engineers and communicate potential security risks and mitigations
- Ability to develop and present briefings to technical and senior management audiences and communicate assessment results, risk analyses, mitigation strategies, and forward plans
For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
Red Hat Certification Programs