Please take this opportunity to join one of GDIT’s fastest long-standing growing programs! US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) is a cutting edge program supporting DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X Team is in direct support of the war fighter and their missions. We are seeking a creative and driven professional with a passion for solving real-world issues on a cross-functional, fast-paced team. You will be part of a dynamic team that is delivering a business driven Enterprise Network to support BICES Global Enterprise Mission Support Services increasing performance, security, scalability, and stability while reducing costs and complexity resulting in increased supportability.
Performs Cybersecurity Infrastructure Support activities (formally known as Cyber Network Defense) for a large Program; coordinates with government Program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures
This position will be working within our Cybersecurity infrastructure environment providing but not limited to; Implementation and Administration of Security Operations, SPLUNK, ACAS, ESS, and security related activities to secure and harden the cybersecurity systems.
Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.
Utilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall program security posture
Conduct network and system audits for vulnerabilities using Security Technical Implementation Guides (STIGs), ACAS vulnerability scanner, and DISA SCAP to mitigate those findings for Linux, Windows, and associated network operating systems
Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices
Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance
Provides guidance and work leadership to less-experienced technical staff members
Maintains current knowledge of relevant technology as assigned
Participates in special projects as required.
5+ years of experience required.
Must possess and maintain a Top Secret/SCI clearance.
BA/BS degree required or equivalent work experience.
Comprehensive knowledge of data security administration principles, methods, and techniques
Must meet DoD 8570 requirements and be eligible for IAT level II (including vendor cert for firewall or networking) and CSSP Infrastructure Support access upon hire for positions with elevated privileges and maintain ITIL V3 Foundation certification.
Requires familiarity with network concepts, user authentication, and digital signatures
Requires understanding of DOD RMF
Requires understanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, CJCSI 6510 and other applicable policies.
Familiarity with NSA Commercial Solutions for Classified (CSfC) system operation and security log reviews
Experience with Mobile Device Management (MDM) Technologies, such as Mobile Iron, Samsung Galaxy MDM, Aruba Mobility
ESS Proficiency with a focus on back-end maintenance, policy management and deployment.
ACAS Proficiency with a focus on Vulnerability Scan policy, DISA Best Practices and Agent manager deployment.
The ability to work and set priorities on multiple projects/tasks at once and operate in a dynamic, fast-paced team-oriented environment
Depending on job assignment, additional specific certifications may be required; CISSP preferred.
The work is typically performed in an office environment, which requires normal safety precautions; work may require some physical effort in the handling of light materials, boxes, or equipment.
The above-listed job description is not intended to be, nor should it be construed as, exhaustive of all responsibilities, skills, efforts, or working conditions associated with this job. Requests for reasonable accommodations will be considered to enable individuals with disabilities to perform the principal (essential) functions of this job.
About Our Work
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT does not have a vaccination mandate applicable to all employees. To protect the health and safety of its employees and to comply with customer requirements, however, GDIT may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.