Active Secret with SSBI Clearance Required - Must be eligible for Top Secret
Assist the ISSM in ensuring that a Assessment and Authorization package is prepared and maintained in accordance with (IAW) the DoDI 8510.01 Risk Management Framework (RMF) for DoD Information Technology (IT).
Register systems in APMS and process each accreditation package in eMASS under the RMF. Collect artifacts and develop/refine COOP/DRP; System Security Plans and Standard Operating Procedures as needed to ensure compliance with NIST SP 800-53 and CNSSI 1253. Ensure all Cybersecurity Controls for accreditation are met and ultimate submission of package to the AO for an Approval to Operate on all Software and Hardware. Perform pre-validation A&A that includes performance of A&A testing and vulnerability scanning in order to validate cybersecurity policy; regulation; Security Technical Implementation Guide (STIG); and Best Business Practice (BBP) compliance. Perform vulnerability scanning using tools such as the SCAP Compliance Checker and ACAS Scanner. Performs Computer Security Incident Response activities for a large organization; coordinates with other government agencies to record and report incidents. Evaluate firewall change requests and assess organizational risk. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure; applications and operating systems. Ensures the integrity and protection of networks; systems; and applications by technical enforcement of organizational security policies; through monitoring of vulnerability scanning devices. Performs periodic and on-demand system audits and vulnerability assessments; including user accounts; application access; file system and external Web integrity scans to determine compliance. Prepares incident reports of analysis methodology and results. Provides guidance and work leadership to less-experienced technical staff members; and may have supervisory responsibilities.
Bachelors Degree in Computer Science or a related technical discipline; or the equivalent combination of education; professional training or work experience
8-10 years of related experience in Cybersecurity administration. CISSP (or associate) certification required. This position may occasionally require some physical activity; lifting objects; bending; crouching down (i.e. to troubleshoot equipment); and long periods of sitting.
Must be eligible for German TESA. Must acquire ITIL Foundation within 90 days of hire.
- Candidate must meet German German TESA requirements - Candidate must meet DoD 8570 IAT Level III certification requirements - Candidate must obtain ITIL Foundation certification within 90 days of hire
German TESA requirements: - A bachelors degree plus 3 years of recent specialized experience, OR; - An associates degree plus 7 years of recent specialized experience, OR; - A major certification plus 7 years of recent specialized experience, OR; - 11 years of recent specialized experience.
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.