Information Security Analyst Sr

Clearance Level
Top Secret/SCI
Category
Systems Analysis
Location
Aberdeen Proving Ground, Maryland
Hybrid Workplace
Key Skills For Success

Information Assurance

Information Assurance Management

Information Security

Information Systems

REQ#: RQ165303
Public Trust: None
Requisition Type: Pipeline
Your Impact

Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.

Job Description

Transform technology into opportunity as a Systems Analyst Expert with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you’ll be at the forefront of innovation and play a meaningful part in improving how agencies operate.

Summary of Pprogram:

Provide system/software engineering support to U.S. Army Communications-Electronics Command (CECOM) Software Engineering Center (SEC), IEW&S Directorate Sensors and Mission Division (SMED) to maintain mission continuity, provide a world-class sustainment workforce focused on current and future Warfighter requirements, provide software solutions and services for present and future customers, and maintain Army field readiness with Post-Production Software Support (PPSS) and Post Deployment Software Support (PDSS).

This support is for the following systems:

  • Biometric Automated Toolset Army (BAT-A)
  • Distributed Common Ground System-Army (DCGS-A) OGS SIPR
  • Enhanced Medium Altitude Reconnaissance and Surveillance System (EMARSS)
  • Guardrail Common Sensor (GRCS)
  • Husky Mounted Detection System
  • Long-Range Advanced Scout Surveillance System (LRAS3)
  • Second Generation Forward Looking Infrared (SGF)
  • Small Tactical Radar Lightweight (STARLite)


HOW A SYSTEMS ANALYST EXPERT WILL MAKE AN IMPACT

  • Performs functions of a qualified Information Assurance Manager at Level II, such as a pre-deployment Information Systems Security Officer/Manager (IASO/IAM), Information Assurance Technical (IAT) Level III or Computer Network Defense - Auditor (CND-AU) consistent with performance standards and duties outlined in DoD 8570.01-M that is mandated by the DFARS. 
  • Personnel in an information assurance management role are responsible for the information assurance (IA) program of an Information System (IS) or major mission application within the Network Environment (NE). Incumbents in these positions perform a variety of security related tasks, including the development and implementation of system information security standards and procedures.
  • Ensure that IS are functional and secure within the Network Environment (NE).  Personnel performing senior technical work in this category focus on the enclave environment and support, monitor, test, and troubleshoot hardware and software Information Assurance (IA) problems pertaining to the Computing Environment (CE), Network Environments (NE), and enclave environments. IAT Level III personnel have mastery of the functions of both the IAT Level I and Level II positions.
  • Collect data from a variety of Computer Network Defense (CND) tools (including data from approved information assurance (IA) tools to include intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occur within their environment.
  • Apply analytical skills to this data and all compliance with relevant non-technical controls, such as physical security and configuration management, to perform an audit function for the Agent of the Certification Authority (ACA) or other government Information Assurance (IA) Manager for mitigation of risks and reporting to include report generation for certification and accreditation packages or Certification of Networthiness efforts.  When in the Computer Network Defense - Auditor role (CND-AU) personnel perform assessments of systems and networks within the Network Environment (NE) or enclave and identify where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. CND-AUs achieve this through passive evaluations (compliance audits) and active evaluations (penetration tests and/or vulnerability assessments).
  • DoD 8570.01-M spells out the tasks and duties in detail and the DFARS stipulates compliance with the DoD 8570.01-M. 
  • Must have a working knowledge of the functions spelled out in DoD 8570.01-M for their role of either IA Management Level II, CND-AU or IAT III.

WHAT YOU’LL NEED TO SUCCEED:

Education:

  • BA/BS with concentration in Information Security or Cyber Security
  • Must be Information Assurance (IA) Trained and Certified per the Defense Federal Acquisition Regulation Supplement; IAW DoD 8570.1-M, Change 2. Computer Science, or other Engineering or Technical discipline with an Information Security or Cyber Security Concentration.

Substitution:

  • At least nine years of professional enterprise or major program of record information system (IS) or mission application experience, appropriate Information Assurance Technical (IA) Technical and Computing Environment (CE) certifications, and qualified to perform in Information Assurance Management Level II, Technical Level III or Computer Network Defense - Auditor (CND-AU) positions in accordance with standards spelled out in DoD 8570.01-M and the Army Information Assurance(IA) Training and Certification Best Business Practice, corrected 6 Aug 2010.   Experience can substitute for the degree provided the person has BOTH the relevant experience AND is fully Information Assurance (IA) certified in accordance with AR 25-2, Information Assurance, and the associated best business practice for IA Training and certification (IA Training BBP).

Certifications:

  • CompTia Security+
  • Certified Information Systems Security Professional - Architecture (CISSP)
  • Security 5 Certification
  • Certified Information Systems Security Professional (CISSP)
  • IT Information Library Foundations Certification (ITIL)
  • Certified Information Security Manager (CISM)

Security Clearance Level: Top Secret/SCI

Location: Hybrid

US Citizenship: Required


GDIT IS YOUR PLACE:

  • Full-flex work week to own your priorities at work and at home
  • 401K with company match
  • Comprehensive health and wellness packages
  • Internal mobility team dedicated to helping you own your career
  • Professional growth opportunities including paid education and certifications
  • Cutting-edge technology you can learn from
  • Rest and recharge with paid vacation and holidays
Work Requirements
Years of Experience

7 + years of related experience

* may vary based on technical training, certification(s), or degree

Certification

CompTIA - Security+ - CompTIA

ITIL Foundation - ITIL

Travel Required

10-25%

Citizenship

U.S. Citizenship Required

About Our Work

We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.