The Cyber Security Analyst will provide expert consultation across a wide range of cross-functional areas of Cybersecurity (CS) services in support of a Department of Defense Mission. The Cyber Security Analyst will provide project planning, guidance and technical expertise in the following areas: program, policy, process, planning, risk management, auditing, Assessment and Authorization (A&A); and quality planning and control.
Essential Duties and Responsibilities:
The Candidate is responsible for safeguarding Sensitive and/or Classified Data to include maintaining classification guidance for systems, providing classified handling, processing and discussion guidance. Manage the Vulnerability Management Process via the Enterprise Mission Assurance Support Service such as, eMASS, Xacta IA Manager, or SharePoint.
Perform CS Self-Assessment Security Review to ensure compliance. Develop/maintain disaster recovery plan. Ensure that an adequate IT Security Program is in place (SOPs, User Guides, Training, STIG and IAVM compliance etc.).
Ensure systems are registered and compliant. Review, document and approve requirements for shared/service accounts.
Provide technical security expertise in planning, preparing and executing the DoDIN connection approval requirements for DoD Service and Agency Information Systems. This work also includes Connection Compliance Assessment efforts, assessing the local subscriber environment information system and technology's security posture for compliance with policies and directives.
Prepare letters recommending the government grant Assessment and Authorization to the DoD networks. Assist customers in resolving connection issues associated with their connection requests, and recommend solutions to bring their systems/networks/ architectures into compliance with connection requirements.
Review and recommend CS solutions to customer problems based on an understanding of how products and services interrelate and supports the CS mission and the viewpoints of the consumers of those products and services.
Analyze and recommend resolution of CS problems based on knowledge of the major CS products and services, an understanding of their limitations and knowledge of the disciplines of cyber security.
This shall include but not limited to the following:
Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. Evaluate firewall change requests and assess organizational risk. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems. Assists with implementation of counter-measures or mitigating controls. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. Prepares incident reports of analysis methodology and results. Provides guidance and work leadership to less-experienced technical staff members. Maintains current knowledge of relevant technology as assigned. Participates in special projects as required. Assists the CS A&A Manager on all aspects of DoD network A&A to operate for the Joint Worldwide Intelligence Communications System (JWICS) enterprise network; including RMF documentation and certifications. Develops and implements A&A security standards and procedures. Recommends A&A CS solutions to support customer requirements. Identifies; reports; and resolves security violations. Establishes and satisfies A&A and CS requirements based upon the analysis of user; policy; regulatory; and resource demands. Ensures that all information systems are functional and secure. Supports A&A activities in support of JWICS systems; sites; and networks. Coordinates with DISA or other outside entities in support of audits and inspections and provides any required documentation in support of such audits/inspections. Provides guidance and leadership to less-experienced technical staff members. Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.
Bachelor’s Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.
5-8 years of related experience in Cyber Security administration
Additionally, the candidate must have a current CISSP or CASP Certification to meet the baseline requirements for IAM III level under 8570.01M.
Must possess working knowledge of Assessment and Authorization practices within DoDI8510.01, ICD 503, CNSSI 1253, and the Risk Management Framework (RMF) process including various security tools (ACAS, HBSS, etc).
Additional computer environment certifications like Server 2012, UNIX Solaris 10, CCNA-Security, CCNA-Voice, CCNP, and MCP are a plus.
Candidate may be subject to a Counterintelligence Polygraph upon customer request.
As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
Software Powered by iCIMS