GDIT is seeking candidates to support the US Army Intelligence and Security Command (INSCOM). Under the I2TS 3 task order, INSCOM ensures reliable, uninterrupted availability of Command, Control, Communications, Computers, and Information Management (C4IM) including: networks, hardware, software, engineering, and specialized tools at the point of customer need to support INSCOMs mission. INSCOM and its MSCs provide the enabling layer to connect the Army and its tactical formations to defense and national intelligence agencies via tactical networks. The ability to provide mission critical intelligence is dependent on the successful use of its information technology (IT) networks worldwide.
Principal Duties and Responsibilities:
An I2TS 3 Cybersecurity Systems Engineer will:
Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established IA standards and regulations, and recommend mitigation strategies
Validate and verify system security requirements definitions and analysis and establishes system security designs
Design, develop, implement and/or integrate IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements
Build IA into systems deployed to operational environments
Assist architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application security policy and enterprise solutions
Support the building of security architectures
Enforce the design and implementation of trusted relations among external systems and architectures
Assess and mitigate system security threats/risks throughout the program life cycle
Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations
Review certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content
Perform system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of operational IA and CND systems
Apply system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off- the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security testing.
Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments.
Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components.
Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures.
Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments.
Support security planning, assessment, risk analysis, and risk management.
Identify overall security requirements for the proper handling of Government data
Desirable Skills / Experience:
Possess working knowledge of Assessment and Authorization practices within DoDI8510.01, ICD 503, CNSSI 1253, and the Risk Management Framework (RMF) process including various security tools (ACAS, HBSS, etc).
Knowledge of data security administration principles, methods, and techniques
Familiarity with domain structures, user authentication, and digital signatures
Understanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policies
High School Diploma/GED with 8 years of related experience, or Associate’s Degree with 6 years of experience, or Bachelor’s Degree with 4 years of experience
DoD 8570.01-M IAT or IAM Level II Computing Environment (CE) Certification as determined by the Program Manager is required prior to support on contract
Required Security Environment Certification: CompTIA Security+ CE or equivalent
Desired Computer Environment Certification: CCNA-Security, CSA+, CASP CE, Associate of (ISC)2, CISSP, or equivalent
Candidates must be willing and able to attain a CI Polygraph for certain positions as determined by the contract
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.