Develops cyber control solutions and remediation of legacy and emergent technologies. Conducts field surveys installs and operational supports. Performs procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Associated tasks include; 1. Performs Computer Security Incident Response activities for a large organization coordinates with other government agencies to record and report incidents. 2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation. 3. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. 4. Evaluate firewall change requests and assess organizational risk. 5. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems. 6. Assists with implementation of counter-measures or mitigating controls. 7. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. 8. Analyzes the information systems to ensure that appropriate security functions have been included in the systems design and architecture. 9. Performs preliminary forensic evaluations of internal systems. 10. Leads the development and implementation of the information systems security programs 11. Provides guidance in the creation and maintenance of Standard Operating Procedures and other similar documentation 12. Maintains current knowledge of relevant technology as assigned. 13. Participates in special projects as required
Bachelor's Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.
- 15-20 years of related experience in data security administration.
- Passports are required to support on-site staffing and travel requirements. - There will be CONUS and OCONUS travel for assessments, installations, and to support on-site sustainment. - Cyber security certification by position are required (IAM III highly desired). - DoD SECRET clearance required. - Knowledge of Industrial Control Systems (ICS) security highly desired but not required. - Familiarity with USAF EITDR and DoD eMASS desired but not required. - Knowledge of DOD and Air Force DIACAP, Risk Management Framework (RMF), Information Assurance, and NETOPS is a plus. - Familiarity with NIST 800 series desired but not required. - Experience with DoD and US Air Force (USAF) desired but not required.
" We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.