Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
Evaluate firewall change requests and assess organizational risk.
Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
Design, integrate, and implement information systems security infrastructure
Analyzes the information systems to ensure that appropriate security functions have been included in the systems design and architecture.
Recommend and implement changes to enhance systems security and prevent unauthorized access.
Research security trends new methods, and techniques used in unauthorized access of data to preemptively eliminate the possibility of system breach.
Provide guidance and direction on best practices for the protection of information.
Safeguards the network against unauthorized infiltration, modification, destruction or disclosure.
Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools.
Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications.
Develop policies and procedures to prevent unauthorized access.
Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies.
Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information.
Provides expert guidance and leadership to less-experienced team members.
May serve as a task or project leader. (Not a people manager)
Provides information assurance project management, technical security staff oversight, and development of mission-critical technical documents.
Develops and improves processes and direction for projects.
Performs preliminary forensic evaluations of internal systems.
Leads the development and implementation of the information systems security programs
Provides guidance in the creation and maintenance of Standard Operating Procedures and other similar documentation
Ensure compliance with regulations and privacy laws.
Recognized as an industry leader in information security.
14+ years of experience with DoD, USAF, and interagency cybersecurity and/or information assurance within the following areas:
testing NIST SP 800-53 security controls.
experience with IT audits, including conducting technical security compliance tests and vulnerability assessments.
experience with conducting security assessment and authorizations or Certification and Accreditation (C&A).
Knowledge of reverse engineering best practices and industry standard methodologies.
DoD, USAF, and interagency information assurance requirements.
DoD, USAF, and interagency security accreditation procedures.
Cyber systems development and sustainment.
Network protection, attack, and exploitation.
Integration and test for DoD & USAF systems.
Current applicable SAP and SCI information assurance requirements (e.g., JSIG, RMF, JAFAN, etc.).
DoD and/or USAF Special Access Programs.
Able to work either independently or in a team to conduct reverse engineering.
The ability to coordinate, brief, and work with Senior DoD officials.
Excellent written and verbal communication skills are required.
Bachelor's degree in an IT-related field (e.g., cybersecurity, computer science, computer engineering).
Master's degree in an IT-related field (e.g., cybersecurity, computer science, computer engineering) (DESIRED)
(DoD8570 compliant) - One or more of the following required:
Certified Information Systems Security Professional (CISSP).
Certified Network Engineer (CCNE).
Certified Information Security Manager (CISM).
Microsoft Certified Systems Engineer (MCSE).
Certified Ethical hacker (CEH)(DESIRED).
TS, SCI/SAP eligible
U.S. Citizenship is required for this position.
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.