Performs forensic analysis of digital information and gathers and handles evidence. Identifies network computer intrusion evidence and perpetrators
Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established IA standards and regulations, and recommend mitigation strategies
o Validate and verify system security requirements definitions and analysis and establishes system security designs
o Design, develop, implement and/or integrate IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements
o Build IA into systems deployed to operational environments
o Assist architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application security policy and enterprise solutions
o Support the building of security architectures
o Enforce the design and implementation of trusted relations among external systems and architectures
o Assess and mitigate system security threats/risks throughout the program life cycle
o Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations
o Review certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content
o Perform system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of operational IA and CND systems
o Apply system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security testing
5+ years of experience required
TS/SCI clearance required
DoD 8570 compliance or information assurance certification required within the task order.
systems engineering, training and professional services to customers across federal, state, and local governments, and in the commerciall sector.
" We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.