Job Description :
Transform technology into opportunity as an Information Security Analyst Sr with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most.
At GDIT you’ll be at the forefront of innovation and play a meaningful part in improving how agencies operate.
Provide system / software engineering support to U.S. Army Communications-Electronics Command (CECOM) Software Engineering Center (SEC), IEW&S Directorate Sensors and Mission Division (SMED) to maintain mission continuity, provide a world-class sustainment workforce focused on current and future Warfighter requirements, provide software solutions and services for present and future customers, and maintain Army field readiness with Post-Production Software Support (PPSS) and Post Deployment Software Support (PDSS).
This support is for the following systems :
- Biometric Automated Toolset Army (BAT-A)
- Distributed Common Ground System-Army (DCGS-A) OGS SIPR
- Enhanced Medium Altitude Reconnaissance and Surveillance System (EMARSS)
- Guardrail Common Sensor (GRCS)
- Husky Mounted Detection System
- Long-Range Advanced Scout Surveillance System (LRAS3)
- Second Generation Forward Looking Infrared (SGF)
- Small Tactical Radar Lightweight (STARLite)
HOW AN INFORMATION SECURITY ANALYST SR WILL MAKE AN IMPACT
- Responsible for the design, development, implementation, and / or integration of a DoD IA architecture, system, or system component for use within Computing Environment (CE), Network Environments (NE), and enclave environments
- Responsible for the information assurance (IA) program of an Information System (IS) or major mission application within the Network Environment (NE)
- Perform a variety of security related tasks, including the development and implementation of system information security standards and procedures and to also include network designs that encompass multiple CE and / or NE to include those with differing data protection / classification requirements
- Ensure that IS are functional and secure within the Network Environment (NE) with focus on the enclave environment and support, monitor, test, and troubleshoot hardware and software Information Assurance (IA) problems pertaining to the Computing Environment (CE), Network Environments (NE), and enclave environments
- Collect data from a variety of Computer Network Defense (CND) tools (including data from approved information assurance (IA) tools to include intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occur within their environment
- Ensure that the architecture and design of Department of Defense (DoD) Information Systems (IS) are functional and secure.
This may include designs for program of record systems and special purpose environments with platform IT interconnectivity
- Apply analytical skills to this data and all compliance with relevant non-technical controls, such as physical security and configuration management, to perform an audit function for the Agent of the Certification Authority (ACA) or other government Information Assurance (IA) Manager for mitigation of risks and reporting to include report generation for certification and accreditation packages or Certification of Networthiness efforts
- Perform assessments of systems and networks within the Network Environment (NE) or enclave and identify
WHAT YOU’LL NEED TO SUCCEED :
Education : BA / BS or advanced degree with concentration in Information Security or Cyber Security
Substitution : At least nine years of professional enterprise or major program of record information system (IS) or mission application experience, appropriate Information Assurance Technical (IA) Technical and Computing Environment (CE) certifications, and qualified to perform in Information Assurance Management Level II, Technical Level III or Computer Network Defense - Auditor (CND-AU) positions in accordance with standards spelled out in DoD 8570.
01-M and the Army Information Assurance(IA) Training and Certification Best Business Practice, corrected 6 Aug 2010. Experience can substitute for the degree provided the person has BOTH the relevant experience AND is fully Information Assurance (IA) certified in accordance with AR 25-2, Information Assurance, and the associated best business practice for IA Training and certification (IA Training BBP)
Required Experience : 10 Years
Certifications :
Must be Information Assurance (IA) Trained and Certified per the Defense Federal Acquisition Regulation Supplement; IAW DoD 8570.
1-M, Change 2. Computer Science, or other Engineering or Technical discipline with an Information Security or Cyber Security Concentration.
- For 8140 compliance CSC / GCSA / GCLD / CISSP-ISSEP
- Must have a working knowledge of the functions spelled out in DoD 8570.01-M for their role of either IA Management Level II, CND-AU or IAT III.
Security Clearance Level : Top Secret / SCI
Location : Hybrid
US Citizenship Required
GDIT IS YOUR PLACE :
Full-flex work week to own your priorities at work and at home
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career
Professional growth opportunities including paid education and certifications
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays
The likely salary range for this position is $80,226 - $133,973. This is not, however, a guarantee of compensation or salary.
Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours :
Travel Required : 10-25%
10-25%
T elecommuting Options :
Hybrid
Work Location : USA MD Aberdeen
USA MD Aberdeen