[Close] 

Mid-Level Cybersecurity Specialist - Assessment and Authorizatio with Security Clearance

Mid-Level Cybersecurity Specialist - Assessment and Authorization A&A/RMF Job Locations USA-VA-Arlington Job ID 2018-44256 Number of Positions 1 Job Function Information Technology Security Clearance Level Top Secret/SCI Full/Part Time Full Time Job Description As the Assessment and Authorization support, this position will be responsible to plan, develop, and execute automated and manual tests to validate security posture/controls in accordance with DOD 8500.2/8510.01. This position will work directly with teams that support DoD Information Assurance Certification and Accreditation (DIACAP) and Risk Management Framework (RMF). The candidate will analyze current documents, and provide detailed reports. The individual will also update and maintain core enterprise lifecycle documents, including system security plan, security assessment plan and report, contingency plan, standard operating procedures, remediation plans, and configuration management plan. ? You could also be asked to: Author DoD IA Assessment and Authorization (A&A) artifacts Document a system from an IA perspective. Derive, document and/or identify system CONOPS for Mission Assurance Categorization per DoDI 8500.2. Lead the research, recommend and document logical and physical solutions that prevent, detect and correct the system to be certified and accredited. Research and apply DISA Security Technical Implementation Guides (STIGs) and NSA recommendations. Lead the identification of disagreements between as built specifications, security requirements and DoD security policies and design implementations to bring the system into compliance. Plan, develop, execute and document results of security test procedures. Lead the preparation and execution an Information Assurance Vulnerability Management (IAVM) Plan. Lead the preparation and production of a System Security Plan (SSP). Lead the preparation of a Plan Of Action and Milestones (POA&M) Lead the technical support effort in identifying and specifying requirements and performing risk assessments. Lead or Develop Standard Operating Procedures (SOP) Use tools such as Host Based Security System (HBSS), Assured Compliance Assessment Solution (ACAS), Junos Space, Cisco Prime and Cisco Adaptive Security Appliance. ? Education Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. ? Qualifications REQUIRED: Active Secret security clearance or higher Computing Environment certification (i.e. MCSE Server 2012, MCSA Server 2012, MCSE Productivity, Linux+, RHCSA, RHCE, RHCSS, LPIC-1, LPIC-2, Novell Certified Linux Engineer, Oracle Solaris System Administrator (OCA, OCP or OCF), GCUX, BSDA, CSE ? Specialty in Networking and Security ? HP-UX, etc.) Current 8570 IAT or IAM Level II Certification or higher (i.e Security+ CE, SSCP, GSEC, CISSP, CISA, CASP, CISM, GSLC, CAP, CASP, CISM) 5-8 years of related experience in data security administration. Must have 4 years of experience in information technology. Must have 1 year lead experience in information technology DESIRED:? Active TS/SCI security clearance Knowledge of multiple database architectures: Cisco, Oracle, Linux, Windows, and VMWare. ? ? For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class. ?#cjpost #cjobs?
Top Secret/SCI


Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Mid-Level Cybersecurity Specialist - Assessmen...
Arlington, VA General Dynamics Information Technology
SENIOR LEVEL VISUAL INFORMATION SPECIALIST (re...
Dahlgren, VA MCLAUGHLIN RESEARCH CORP
Information Assurance/ Security Specialist, Se...
Ft Myer, VA GENERAL DYNAMICS IT
Technical Project Manager - Humanitarian Assis...
Ft Myer, VA Redhorse Corporation
SERVICES CONTRACT SPECIALIST (Ref. #1800-DG) w...
Ft Myer, VA MCLAUGHLIN RESEARCH CORP