Sorry, this job is no longer accepting applications. See below for more jobs that match what you’re looking for!

Information Security Analyst

Expired Job

Arma Global Fort Walton Beach , FL 32549

Posted 2 months ago

Job Description:

Responsibilities

The Information System Security Manager (ISSM), works under general supervision to ensure all related information assurance (IA) and Authorization & Accreditation (A&A) activities for all AFSOF C2MS occur in accordance with DoD 8500 series publications, National Institute of Standards and Technology (NIST), CJCSI 6510.01, Security Technical Implementation Guides (STIGs), and other applicable governing publications. The ISSM shall work as a member of a team to evaluate C2MS configurations, create System Security Plans, Disaster Recovery Plan, Incident Response Plans and other artifacts as required to facilitate the A&A of AFSOF systems. The ISSM shall assist system engineers and system administrators comply with the vulnerability management program and secure systems, networks and applications. The ISSM shall conduct vulnerability scans, analyze scan findings and provide recommended fix actions to systems personnel. The ISSM as part of the CyberSecurity team shall prepare, submit, and coordinate DoD Risk Management Framework (RMF) packages for all AFSOF C2MS systems. The ISSM shall be able to evaluate new and existing system designs and recommend technical changes to improve security.

Knowledge, Skills and Abilities

  • 2-5 years of systems security/information assurance related experience.

  • 3-4 years of technical experience in systems/network administration or software development

  • Demonstrated Windows and/or Linux Operating System System Administration/Engineering

  • Experience with eMASS, EITDR or Xacta accreditation workflow systems is preferred

  • RMF/NIST SP 800-53 knowledge preferred

  • ACAS/Nessus Vulnerability Scanner knowledge is highly desirable

  • Software Code Scanning / Application Security Testing / Penetration Testing is highly desirable

  • Incident Response or Computer Network Defense experience is highly desirable

  • ITIL v3 Foundation certification preferred

  • EMSEC/TEMPEST knowledge preferred

  • Excellent technical writing skills a must

  • Must have good communication skills and be detail oriented

  • Self-motivated, shows initiative, and works with minimal direction

  • Must be able to manage multiple tasks and projects simultaneously

  • Strong analytical and problem-solving skills and proactive thinking skills

  • Basic level familiarity with DoD, USAF, USSOCOM, and other Cyber Security Regulatory Compliance bodies

  • Provide technical support to system and technology owners to propose mitigation and remediation solutions

  • Assist with routine compliance and audit functions to ensure regulatory scanning requirements are satisfied

  • Document and report on processes and procedures

  • Stay current on security industry trends, attack techniques, mitigation techniques, security technologies and new and evolving threats to the organization by attending conferences, networking with peers and other education opportunities

  • Sense of urgency to address new technologies being deployed: Continuous development of infrastructure and cloud security expertise to function as subject matter expert in multiple technical disciplines

  • A Cyber Security Team team-player contributing to policy development, RMF package accreditations, and EMSEC/TEMPEST requirements

Education

  • Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.

Qualifications

  • 2-5 years of related experience in data security administration.

  • DoD 8570 IAM II Level Certification Required (Security + CE)

  • CISSP, CISM, GSLC, CAP, SSCP, GIAC Security Essentials, and other security related certifications a plus

For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.

#c2ms #dpost #isdcj #arma


See if you are a match!

See how well your resume matches up to this job - upload your resume now.

resumetriaasssdfel.jp… Change Resume
Find your dream job anywhere
with the LiveCareer app.
Download the
LiveCareer app and find
your dream job anywhere
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Princ Information Security ...

Arma Global

Posted Yesterday

VIEW JOBS 8/14/2018 12:00:00 AM 2018-11-12T00:00 Job Description Information Systems Security Manager/Risk Analyst Description: Compliance means a great deal to our customers, and it means a great deal to us as well. Our Risk Analyst is a key player in obtaining and maintaining our compliance certifications by researching, analyzing, and participating in the development of Information Assurance/Cybersecurity policy documents and awareness materials. The qualified individual will work hand-in-hand with other Cloud Center of Excellence Team members and Integrated process Teams to identify, implement, and automate solutions that ensure compliance, identify and resolve security incidents and risks concerns, before they impact service delivery and operations. Responsibilities: * Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource requirements. * Assesses risks, identify mitigation requirements, and develop accreditation and certification artifacts required to support business objectives. * Implements and sustains a Risk Management Framework (RMF) program. * Identifies and mitigates threats to security postures. * Adhere to DevOps practices, using a suite of standard tools. * Collaborate with fellow teammates on complex problems, and recommend improvements. * Assist in the deconstruction, definition, and interpretation of requirements supporting customer projects. The Ideal Candidate Will: * Be awesome to work with! * Enjoy working in the public sector. You have a passion for education, training, designing, and building cutting-edge cloud computing systems for the worlds' leading Armed Forces communities. * Have an understanding of standards and compliance requirements that impact the public sector. The candidate should have a variety of experiences working as an Information Assurance Manager, Information System Security Officer, or Configuration Manager. * Enjoy making use of your existing skills, but also developing new ones. * Relish diving deep into the details surrounding a challenge- possibly writing code- and generally doing what it takes to support the customers' mission. * Possess good speaking and presentation skills for use in both formal settings, as well as white-boarding sessions with other seasoned developers. * Consistently demonstrate a thorough understanding of best practices when operating in a remote computing environment. * Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. * Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents. * Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation. * Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. * Evaluate change requests and assess organizational risk based on security standards, frameworks and governance. * Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems. * Assists with implementation of counter-measures or mitigating controls. * Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. * Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. * Prepares incident reports of analysis methodology and results. * Provides guidance and work leadership to less-experienced technical staff members, and may have supervisory responsibilities. * May serve as a technical team or task leader. * Maintains current knowledge of relevant technology as assigned. * Participates in special projects as required. Security: This position may require a Department of Defense security clearance. The ideal candidate will have an active clearance, have possessed a clearance in the past, or be otherwise eligible to obtain a security clearance. As such, this position is open to U.S. Citizens only. About Us: We are a full service integrator and services provider focused on both government and commercial clients. We bring extensive, real-world experience in overseeing the design, implementation, executing and ongoing support of domestic and international programs. We pride ourselves in providing creative solutions to our client's challenges. Our customers and industry partners appreciate the flexible solutions we provide through tightly integrated core lines of business and "best of breed" work force. We offer highly competitive compensation and benefits packages to our team members as well as growth and development opportunities to achieve your personal goals and objectives Education Education, Certification and Experience: * A minimum of 5 years of experience working in the Information Technology field. * Bachelors or Masters Degree in Computer Science, Computer Engineering or Math from an university accredited by the Accreditation * Board for Engineering and Technology, or an equivalent combination of education and work experience. * The candidate may also have one or more industry certifications from entities such as Amazon Web Services, Microsoft Corporation, Red Hat, CompTIA, (ISC)2, or others. Qualifications Essential Qualifications: * Expertise with National Institute of Standards and Technology (NIST) Special Publications (SP) such as 800-18, 800-30, 800-37, 800-53. 800-60,800-115, 800-144, and 800-146, and Federal Information Processing Standards (FIPS) 199 and 200. * Expertise with Center for Internet Security published controls and benchmarks, as well as understanding of information security standards such as ISO/IEC 27001:2013. * Expertise in and working knowledge of Federal agency responsibilities for IT security, IT auditing, IT compliance reporting, risk management processes, contingency planning, incident response plans, and configuration management in both unclassified and classified environments. * Experience in FISMA compliance and auditing program implementation, including policy guidance, compliance auditing and assessments, finding resolution, and reporting. * Experience in security control assessments, vulnerability analytics, continuous compliance monitoring, and periodic and annual reporting. * Experience in conducting and managing Privacy Impact Assessments (PIA). * Experience implementing and evaluating federal and industry security requirement guides. * Experience implementing and managing a vulnerability management program, and interpreting security reports. Familiarity with either the Amazon Web Services or Microsoft Azure ecosystem. * Understanding of the Red Hat Enterprise Linux or Microsoft Windows Server platforms. * Self-motivating and have the ability to work independently when necessary, but able to work with other on team projects. Highly Desirable Qualifications: * Understanding of Agile Software Development, and have used either Kanban or scrum-based scheduling. * Understanding of test-driven development. * Past experience working with Continuous Integration pipelines is a plus. * Experience using or evaluating the status of security components such as firewalls, IDS tools, and SIEM tools. Arma Global Fort Walton Beach FL

Information Security Analyst

Expired Job

Arma Global