Information Systems Security Sr. Advisor

Clearance Level
Top Secret SCI + Polygraph
Information Security
Annapolis Junction, Maryland

REQ#: RQ71964

Travel Required: Less than 10%
Public Trust: None
Requisition Type: Regular

Eagle Alliance is looking for an Information Systems Security Sr. Advisor that holds TS/SCI with Poly clearance for a position located in Annapolis Junction , MD.

The Senior Information Systems Security Sr. Advisors typical duties will include:

  • Review Nessus/ACAS scan results and provide direction where required

  • Recognizes potential, successful, and unsuccessful scan results for efficiency in reporting compromises thorough reviews and analyses of relevant event detail and summary information

  • Evaluate systems baseline security state (STE, Health & Status) verified through Xacta and LatteArt source of record systems

  • Review and mitigate liens (POAMS)- continuous assessment

  • Collaborate and develop Splunk use case dashboard reporting for security baseline

  • Weekly reporting of system health status

  • 100% Scan compliance validation for systems

  • Maintain 98% asset accountability for in scope systems

  • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems

  • Assists with implementation of counter-measures or mitigating controls

  • Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans

  • Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools

  • Safeguards the network against unauthorized infiltration, modification, destruction or disclosure

  • Responds to queries and requests for computer security information and reports

  • Conducts investigations of computer security violations and incidents, reporting as necessary to management

  • Researches, evaluates, tests, recommends, communicates and implements new security software or devices

  • Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications

  • Develops materials for computer security education/awareness programs

  • Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies

  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance

  • Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information

  • Provides advanced guidance and leadership to less-experienced team members

  • May serve as a team or task leader. (Not a people manager)

  • Provides information assurance project management, technical security staff oversight, and development of mission-critical technical documents

  • Ensure compliance with regulations and privacy laws


  • BS + 10 yrs related experience OR equivalent combination of education and experience

  • Active TS/SCI with current polygraph

  • DoD 8570 Level II Certification (Security+ or similar)

CWIP - IAT level II Compliance:

Persons provide network environment (NE) and advance level compute environment (CE) support. Responsible for finding and fixing unprotected vulnerabilities and ensuring that remote access points are well secured. Focuses on threats and vulnerabilities and improving the security of systems. Demonstrates a mastery of the functions of the IAT Level I position. Monitors, tests and troubleshoots hardware and software IA problems pertaining to the network environment. Recommends and schedules IA related repairs to include performing IA related customer support functions such as installation, configuration, troubleshooting, customer assistance, in response to customer requirements for the network environment (NE). Analyzes patterns of non-compliance and identifies vulnerabilities resulting from a departure from the implementation plan or that were not apparent during testing. Provides leadership and direction to IA operations personnel. Implement applicable patches including IAVAs, and IAVBs for their environment.  (Reference: Policy 6-34) for Cyber Workforce Improvement Plan (CWIP).



We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.