Chantilly, Virginia, USA
3 days ago
Information Security Analyst
REQ#: RQ200927Public Trust: None Requisition Type: Regular Your Impact

Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.

Job Description

Check out this great opportunity to join one of GDIT’s fastest long-standing growing programs!  US Battlefield Information Collection and Exploitation Systems eXtended (US BICES-X) is a cutting-edge program supporting DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war fighter and their missions. We are seeking a creative and driven professional with a passion for solving real world issues on a cross-functional, fast paced team. 

Responsibilities:

Strategy & Planning

Determines enterprise information security standards.Develops and implements information security standards.Provides tactical information security advice and examining the ramifications of new technologies.Performs all procedures necessary to ensure the security of information systems assets and to protect systems from intentional or inadvertent access or destruction.Ability to provide an independent assessment and ensure security controls are implemented correctly, operating as intended, and are producing the desired outcome.This position requires interaction with customers within the AFRICOM communityMaintains current knowledge of relevant technology as assigned.Completes weekly and monthly reporting requirements.

Operational Management

Serves as a focal point of contact for the information security team and the customer/organization.Manage and configures physical security, disaster recovery, and data backup systems.Manages security audits and vulnerability and threat assessments, and directing responses to network or systems intrusionsEnsures that all information security systems are functional and secure.Assesses current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement.Communicate information security goals and new programs effectively with other managers.Participates in special projects as assigned.This position may be required to complete short-term deployments to AFRICOM AOR.Participates in change management process, assessing security impact of proposed changes.Designs and recommends security policies and procedures.Manages information systems authorizations using eMASS.

Qualifications
Required Qualifications:

3+ years of IA experience.BA/BS or the equivalent combination of education, technical training, or work/military experience.IAM Level II Certification (CISSP, CISM, GSLC, or CCIS)Must possess and maintain a Top Secret/SCI Security Clearance.Must achieve and maintain the Technical Expert Status Accreditation (TESA) as defined in the Status of Forces Agreement (SOFA) between the United States and the Federal Republic of Germany. In order to qualify for TESA, the candidate must have one of the following: Bachelor's degree plus 3 years of specialized experience, OR; an Associate's degree plus 7 years of specialized experience, OR; A major certification plus 7 years of specialized experience, OR; 11 years of specialized experience.Additional specific certifications may be required, depending on job assignment.Ability to work in a team-oriented, collaborative environment.Ability to work efficiently in a fast-paced environment and multi-task while still ensuring high quality of workHighly organized with strong ability to prioritize work and work autonomouslyExcellent verbal and written communication skillsGreat attention to detail and presentationResults driven, highly efficient, energetic and highly motivatedMust possess a high degree of intelligence, competence, maturity, adaptability, resilience, integrity and initiativeThe work is typically performed at client site locations, which requires proper safety precautions; work may require some physical effort in the handling of light materials, boxes or equipment.

Preferred Qualifications:

CISSP certification preferred.Information Security Management experienceKnowledge with Virtualization technologies: VMWare, Citrix, and MicrosoftFamiliarity of concepts such as DevOps, Infrastructure as Code, Software Defined Data Center, Continuous Deployment, and Continuous Integration desired.Knowledge with Network level: WAN and LAN connectivity, routers, firewalls, and security internal systems, cloud and network infrastructureExperience with firewalls and firewall rule sets
Confirmar seu email: Enviar Email