Cyber Incident Management Specialist

Clearance Level
Top Secret
Category
Cyber Security
Locations
Albuquerque, New Mexico
Fort Belvoir, Virginia

REQ#: RQ101482

Travel Required: Less than 10%
Requisition Type: Regular

GDIT is looking for Cyber Incident Management specialist to provide cybersecurity for the development of software application using Software Security principles and adhering to DoD IA and IT Standards for all Defense Stockpile Management System (DSMS) systems. Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.

Requirements

  • BA/BS in Computer Science or related field and 5 years of Cyber related experience. (Additional education, certification, training or work experience can be substituted in lieu of degree)

  • IASAE Level II Certification

  • Top Secret Clearance

Job Description

  • Providing dedicated Host based security system administration and documentation support related to McAfee ePolicy Orchestrator (ePO), including knowledge of Host Intrusion Prevention System (HIPS), Data Loss Prevention (DLP), Rogue System Detection (RSD), Policy Auditor (PA), and Virus Scan Enterprise (VSE).

  • Coordinating with other DSMS program teams, planning and create cybersecurity architecture and design documents for all DSMS cybersecurity architecture ensuring it is compliant with DoD and other Federal IA policies and guidance.

  • Employing best practices when implementing security controls within an IS including software engineering methodologies, system/security engineering principle, secure design, secure architecture and secure coding techniques.

  • Developing cybersecurity architecture and design plans for communication and collaboration products, operating system platforms including servers, devices, management products, applications and overall security related to implementing these products.

  • Providing security engineering support for accreditation of DSMS.

  • Integrating cybersecurity expertise into lifecycle management, planning architecture and design management, migration and deployment, and system testing and implementation.

  • Researching, developing, testing and documenting architectures and solutions for implementing new cybersecurity technologies to provide more seamless information collaboration and cybersecurity capabilities for the program and its user base.

  • Developing and providing a criticality analysis of logic-bearing system components (e.g., hardware, firmware, and software) implementing, protecting, or introducing vulnerability(s) to each function.

  • Developing and updating mission criticality analysis(-es), vulnerability assessment(s), risk assessments(s), and identification and counter measurement implementation(s) for Mission- Critical Functions; ensuring updated assumptions, rationale and results related to the criticality analyses, vulnerability assessments, risk assessments, supply chain risk information, and risk mitigations are made available for Government review.

  • Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.

  • Interprets, analyzes, and reports all events and anomalies in accordance with computer network directives, including initiating, responding, and reporting discovered events.

  • Evaluates, tests, recommends, coordinates, monitors and maintains cybersecurity policies, procedures and systems, including access management for hardware, firmware and software

  • Ensures that cybersecurity plans, controls, processes, standards, policies and procedures are aligned with cybersecurity standards

  • Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security.

  • Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks.

  • Provides guidance and leadership to less-experienced cybersecurity personnel.

This position requires being fully vaccinated against COVID-19 by January 18, 2022 or the start date, if after January 18. Individuals who work in or reside in Texas or Montana or work outside of the United States may be excluded from this requirement.

We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.