Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
Evaluate firewall change requests and assess organizational risk.
Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
Assists with implementation of counter-measures or mitigating controls.
Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans.
Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools.
Safeguards the network against unauthorized infiltration, modification, destruction or disclosure.
Responds to queries and requests for computer security information and reports.
Conducts investigations of computer security violations and incidents, reporting as necessary to management.
Researches, evaluates, tests, recommends, communicates and implements new security software or devices.
Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications.
Develops materials for computer security education/awareness programs.
Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information.
Provides information assurance project management, technical security staff oversight, and development of mission-critical technical documents.
Provides guidance and leadership to less-experienced team members.
May serve as a team or task leader. (Not a people manager)
Ensure compliance with regulations and privacy laws.
DESIRED QUALIFICATIONS: BA/BS (or equivalent experience), 8+ years of experience
The ISSO shall be responsible for the day-to-day security operations of all systems and networks. The ISSO shall be responsible for ensuring the appropriate operational security posture is maintained and documented for JMSC information systems. The position is responsible for implementing DoD, Army, & JMSC policies, and creating & implementing plans of action and milestones (POA&M) in response to vulnerabilities identified during risk assessments, audits, & inspections. This responsibility includes physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and the assistance in the development of security policies and procedures. Assures successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals. The appointed ISSO shall work for and in close collaboration with the Government appointed ISSM. Appointed ISSO shall perform duties in accordance with DoD Instruction 8510.01, DoD Directive 8140.01, NIST Special Publication 800-37, and Army Regulation 25-2.
Possess an expert understanding of NIST, DoD, & Army Cybersecurity & Risk Management Framework policies, directives, instructions, manuals, and best business practices
Knowledge of current industry methods for evaluating, implementing, and disseminating IT security assessment, monitoring, detection and remediation tools and procedures utilizing standards-based concepts and capabilities (e.g. ACAS, SCCM, HBSS).
Knowledge of disaster recovery continuity of operations plans. Knowledge of enterprise incident response program, roles, and responsibilities.
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of Defense-in-Depth).
Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. Knowledge of measures or indicators of system performance and availability.
Bachelor’s degree in engineering, science, mathematics, or a related field
Five (5) years’ experience within the past 10 years, in planning simulation exercise architectures, supervising implementation of communication systems, and integration of Army Mission Command Systems in support of distributed exercises.
Five (5) years’ experience in information technology management
Meet DoD 8570.01-M Baseline Computing Environment (CE) Certification Requirements at Information Assurance Management Level II (IAM II)
Must be a US Citizen
Must possess a TOP SECRET Clearance
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.