RMF and Cybersecurity Leadother related Employment listings - Ft Myer, VA at Geebo

RMF and Cybersecurity Lead

Quick Apply Full-time 3 hours ago Full Job Description (Apply by 10 MAR, SECRET/TS preferred, hybrid or remote, Yorktown, VA) Innovatus Technology Consulting is an established government and commercial consulting firm with over ten years of specialization in information technology advisory services and cloud computing.
We are looking for a mid-career SECRET-cleared IT Specialist with a passion and qualifications in the area of cybersecurity as an information security engineer that also is capable and experienced in RMF and A&A to work full-time remotely or partially remotely depending on experience for NAVSEA's SLDCADA program based in Yorktown, Virginia.
SLDCADA is a highly protected yet unclassified, web-based, customizable time and attendance (T&A) and labor reporting system providing a single input screen via a single sign on capability utilizing Common Access Card/Public Key Infrastructure (CAC/PKI)-based login functionality.
SLDCADA currently provides T&A capabilities and labor reporting services to more than 60,000 users.
SLDCADA is a Java-based application running on an Oracle 19c database platform with production, development, and test environments located in the Amazon Web Services (AWS) cloud environment.
The Data Center and Cloud Hosting Services (DC2HS) acts as the Navy Cloud Broker, providing an Infrastructure as a Service (IaaS) environment to the SLDCADA Program.
Our chosen candidate will join our team to support the SLDCADA program with the following main tasks of responsibility:
Perform system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements.
Provide security planning, assessment, penetration testing, risk analysis, and risk management in compliance with NISCAP and the DoD RMF and NIST RMF processes.
Create and manage user-facing guides, POA&Ms, SPPs, ATOs, and other relevant USG documentation.
Install, configure, and maintain an organization's local area network (LAN), wide area network (WAN), and internet systems or a segment of a network system, to include data communications network, operating systems, and physical and virtual servers.
Perform System monitoring and verify the integrity and availability of hardware, network, and server resources and systems.
Review System and application logs and verify completion of scheduled jobs, including system backups.
Analyze network and server resource consumption and control user access.
Install and upgrade software and maintain software licenses.
Conduct network modeling, analysis, planning, and coordination between network and data communications hardware and software.
Credentials Required for the Job:
Excellent analytical, critical thinking, and data mining skills Excellent oral and written skills.
Proficient in Microsoft applications such as Word, Excel, PowerPoint, and Outlook.
Ability to work independently and as a team member.
Ability to learn and apply technical concepts to assigned duties.
Ability to explore and examine data from multiple disparate sources with the goal of drawing conclusions to address business problems.
Linux
or other Linux certification and Security
required.
DoD 8570 compliance with IASAE Level 2 or DoD 8140.
01-compliant IAT III is required.
Information Systems Security Engineering Professional (ISSEP) or ISC2 CISSP is preferred At least seven (7) years of experience in federal government cybersecurity.
Quick Apply.
Estimated Salary: $20 to $28 per hour based on qualifications.

  • Type: Other
  • Company: Innovatus Technology Consulting -

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.