GDIT is seeking a Lead Information Assurance Security Specialist to support our Joint Strike Fighter (JSF) F-35 IT program support contract. You would provide knowledge-based, information assurance and cybersecurity IT services to the F-35 JSF Virtual Enterprise (JVE) network in support of the F-35 Lightning II Joint Program Office (JPO).
The F-35 Lightning II Program is the Department of Defense's focal point for defining affordable next generation strike aircraft weapon systems for the Navy, Air Force, Marines, and our allies. The F-35 will bring cutting-edge technologies to the battlespace of the future. The JSFs advanced airframe, autonomic logistics, avionics, propulsion systems, stealth, and firepower will ensure that the F-35 is the most affordable, lethal, supportable and survivable aircraft ever to be used by so many warfighters across the globe.
Duties include but are not limited to:
Determines enterprise information assurance and security standards.
Develops and implements information assurance/security standards and procedures.
Coordinates, develops, and evaluates security programs for an organization.
Recommends information assurance/security solutions to support customers’ requirements. Identifies, reports, and resolves security violations.
Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.
Supports customers at the highest levels in the development and implementation of doctrine and policies.
Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.
Performs analysis, design, and development of security features for system architectures. Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers.
Designs, develops, engineers, and implements solutions that meet security requirements.
Provides integration and implementation of the computer system security solution.
Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems.
Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
Ensures that all information systems are functional and secure.
Develops solutions to problems relating to improvement of information assurance effectiveness, organizational structures, work methods and procedure efficiency, and resources requirements, utilization or control.
Develops and drafts program or project milestones, progress monitoring, financial, acquisition, quality control, maintenance, or training documentation related to information assurance activities. Uses automated management information systems in performing fact finding, analytical, and advisory functions related to information assurance activities.#DefenseCampNOVA
MA or MS degree in Computer Science, Information Systems or a related technical discipline.
BA or BS degree and an additional 4 years of experience can be substituted for a MA or MS degree
Active Secret clearance based upon a SSBI or SSBI-PR completed within the past five years.
10+ years of practical CEAT computer security experience in secure network and system design, analysis, procedure/test generation, test execution and implementation of computer/network security mechanisms.
5+ years of management experience.
2+ years’ experience in Vulnerability Assessment and/or Risk Analysis.
Documented experience in the implementation of RMF policies and procedures, and FISMA compliance reporting.
Documented experience in the implementation of DISA STIGs, ACAS scans, and/or SCC scans.
IAM Level III baseline certification in accordance with DoD 8570.01-M, Information Assurance Workforce Improvement Program, (or achieve within six months of TOA or hiring)
Certification in one or more of the following:
Microsoft Certified Technology Specialist (MCTS)
Core Impact Certified Professional Certification (CICP)
Windows Server 2008 Active Directory
GIAC Certified Incident Handler (GCIH)
GIAC Certified Penetration Tester (GPEN)
GIAC Reverse Engineering Malware (GREM)
Certified Ethical Hacker (CEH)
Certified Hacking Forensics Investigator (CHFI)
EC-Council Certified Security Analyst (ECSA)
Licensed Penetration Tester (LPT)
ArcSight Certified Systems Analyst (ACSA)
Qualified Forensics Expert (Q/FE)
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.