IBD-SS Cybersecurity IA Compliance Lead - Secret Clearance Required - Ft. Belvoir, VA

Clearance Level
Secret
Category
Information Security
Location
Fort Belvoir, Virginia

REQ#: RQ84290

Travel Required: Less than 10%
Public Trust: None
Requisition Type: Regular
Contract: IBD-SSPosition: IBD-SS Cybersecurity IA Compliance LeadGDIT Job Title: Information Security Analyst AdvisorGDIT Job Code: WIN09             Grade/Level: 9Location: Fort Belvoir, VirginiaJob Description Summary:

GDIT is seeking a Senior Cybersecurity IA Compliance Lead in support of the IBD-SS contract located in Ft. Belvoir, VA.

Cybersecurity IA Compliance Lead will provide expert analysis of security policy with regard to system design in support of the applicable government and PMO organizations.  The candidate will be responsible for reviewing QRCs and programs of record associated with IBD-SS and ensuring appropriate protocols are applied and documentation generated for verifying the appropriate protocols are followed and the appropriate documentation generated to secure the systems so that they may attain accreditation.  Applicants must be familiar with DoD and Department of the Army accreditation processes and procedures; familiarity with PdM PFS is desired but not required.Primary Duties:
  • Plan and coordinate the IT security programs and policy compliance. Manage and control changes to the system and assessing the security impact of those changes. Obtain C&A for systems under their purview. Provide support for a program, organization, system, or enclave’s information assurance program. Serve as the Approval Authority for systems under their control
  • Ensure that the architecture and design of DoD information systems are functional and secure
  • As needed, design and develop IA or IA enabled products, interface specifications, and approaches to secure the environment
  • Assess threats to the environment
  • Develop and update the system security plan and other IA documentation
  • Provide inputs on the adequacy of security designs and architectures
  • Participate in risk assessment during the certification and accreditation process
  • Provide support for a program, organization, system or enclaves information assurance program
  • Coordinate security certification test and evaluation of assets, vulnerability management and response, security assessments, and customer support
  • Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies
  • Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed
  • Assist with the management of security aspects of the information system and performs day-to-day security operations of the system
  • Evaluate security solutions to ensure they meet security requirements for processing classified information
  • Provide configuration management (CM) for information system security software, hardware, and firmware
  • Prepare documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and Systems Requirements Traceability Matrices (SRTMs)
  • Provide support to the Information Systems Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
  • Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
  • Provide CM for security- relevant information system software, hardware, and firmware
  • Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
  • Develop system security policy and ensures compliance. Administer the user identification and authentication mechanism of the information systems
  • All other duties as assigned
Desired Qualifications:
  • Possess working knowledge of Assessment and Authorization practices within DoDI8510.01, ICD 503, CNSSI 1253, and the Risk Management Framework (RMF) process including various security tools (ACAS, HBSS, etc).
  • Knowledge of data security administration principles, methods, and techniques
  • Familiarity with domain structures, user authentication, and digital signatures
  • Understanding of Army Regulation 25-2, including DoD regulations as implemented by the US Army
Education Required:
  • BA/BS with 8-12 years of experience. Additional years of experience may be considered in lieu of the degree. (15 total years of applicable experience in lieu of a degree.)
Certification(s):
  • Required Security Environment Certification: CASP+ CE, CISA, CISSP (or Associate), GCED, GCIH
Security Clearance:
  • Must have current US Secret security clearance
#IBD-SS We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.