Performs, monitors, tests, and troubleshoots hardware and software Information Assurance (IA) problems pertaining to the Computing Environment (CE), Network Environments (NE), and enclave environments.
Collects and analyzes data and events from Computer Network Defense (CND) tools such as system alerts, firewall, and network traffic logs, and host system logs.
Assesses and identifies the systems and networks within the NE acceptable configurations and policies.
Develops and manages security for more than one IT Functional areas (e.g., data, systems, network and/or web) cross the enterprise.
Leads in the development and implementation of security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures, and use of firewalls and encryption routines).
Briefs and presents status reports on security matters to develop security risk analysis scenarios and response procedures.
Responsible for the tracking and monitoring of software viruses.
Leads in the evaluation of products and/or procedures to enhance productivity and effectiveness.
Provides direct support to the business and IT staff for security related issues.
Possess extensive knowledge in networking, databases, systems and/or web operations, and developing enterprise security strategies.
7+ years of experience project leadership in monitoring computer networks and security issues, investigating and resolving security and cybersecurity incidents.
Must have 5-7 years’ experience serving as an ISSO for major information systems.
Thorough understanding of NIST 800 – Computer Security, Cyber Security, and Risk Management Framework.
Experience in developing system/application certification and accreditation documentation.
Experience working with Agile teams and SAFe to perform testing and uncovering system and network vulnerabilities
Experience in interpreting IT vulnerability scanning results.
Experience in documenting security incidents and performing security vulnerability assessments
Risk assessment experience, threat identification, security categorization, gap analysis, and compliance reporting.
Bachelors Degree in Computer Science, Computer Programming, Computer Engineering or relevant computer based major.
Hold active certification: Certified Information System Security Professionals (CISSP) and Certified Authorization Professionals (CAP).
This position requires being fully vaccinated against COVID-19 by January 18, 2022 or the start date, if after January 18. Individuals who work in or reside in Texas or Montana or work outside of the United States may be excluded from this requirement.
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.