Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
Evaluate firewall change requests and assess organizational risk.
Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
Design, integrate, and implement information systems security infrastructure
Analyzes the information systems to ensure that appropriate security functions have been included in the systems design and architecture.
Recommend and implement changes to enhance systems security and prevent unauthorized access.
Research security trends new methods, and techniques used in unauthorized access of data to preemptively eliminate the possibility of system breach.
Provide guidance and direction on best practices for the protection of information.
Safeguards the network against unauthorized infiltration, modification, destruction or disclosure.
Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools.
Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications.
Develop policies and procedures to prevent unauthorized access.
Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies.
Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information.
Provides expert guidance and leadership to less-experienced team members.
May serve as a task or project leader. (Not a people manager)
Provides information assurance project management, technical security staff oversight, and development of mission-critical technical documents.
Develops and improves processes and direction for projects.
Performs preliminary forensic evaluations of internal systems.
Leads the development and implementation of the information systems security programs
Provides guidance in the creation and maintenance of Standard Operating Procedures and other similar documentation
Ensure compliance with regulations and privacy laws.
Recognized as an industry leader in information security.
Qualifications
Education Requirements:
Professional certifications:
(DoD8570 compliant) - One or more of the following required:
Clearance Requirements:
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.