Job Description
Job Description
Salary : Depends on Experience
You MUST already have a TS / SCI Clearance with a Polygraph to qualify
IT Security Specialist Level 2
Enable planning, coordination, and implementation of the organization’s information security. Identify current organizational security infrastructure, define future program requirements, and design and implement security related IT systems.
Ensure systems provide a high level of data security and user compartmentalization due to the sensitive nature of business and financial data used by TD systems.
Design and develop systems that provide a high level of data security and user compartmentalization due to the sensitive nature of business and financial data used by TD systems.
The Level 2 IT Security Specialist shall possess the following capabilities :
- Provide support to the ISSM for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave.
- Assist in maintaining appropriate operational security posture for an information system or program.
- Provide support to the Government on all matters (technical and otherwise) involving the security of the information system.
- Assist with the management of security aspects of the information system Assist in the development of the system security policy and ensure compliance with that policy.
- Develop and update the system security plan, as well as manage and control changes to the system and assess the security impact of those changes.
- Provide support to plan, coordinate, and implement IT security programs and policies.
- Provide configuration management for security-relevant information system software, hardware, and firmware.
Qualifications :
- Ten (10) years of related work experience in the field of security authorization is required.
- Experience in the following areas : current security tools, hardware / software security implementation; different communication protocols;
and encryption techniques / tools.
- Knowledge of commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
- Bachelor’s degree in Computer Science or IT Engineering is required.
- In lieu of a Bachelor’s degree, an additional four (4) may be substituted substitution.
This is a CWIP Billet per DOD Directive 8570-1 and must meet specified certification requirements defined and documented by the TTO COR.