Type of Requisition Regular Clearance Level Must Currently Possess Top SecretSCI Clearance Level Must Be Able to Obtain Top SecretSCI Suitability No Suitability Required Public TrustOther Required None Job Family Information Security Job Description GENERAL SUMMARY GDIT is seeking candidates to support the US Army Intelligence and Security Command (INSCOM). Under the I2TS3 task order, INSCOM ensures reliable, uninterrupted availability of Command, Control, Communications, Computers, and Information Management (C4IM) including networks, hardware, software, engineering, and specialized tools at the point of customer need to support INSCOMaposs mission. INSCOM and its MSCs provide the enabling layer to connect the Army and its tactical formations to defense and national intelligence agencies via tactical networks. The ability to provide mission critical intelligence is dependent on the successful use of its information technology (IT) networks worldwide. Principal Duties and Responsibilities An I2TS 3 Cybersecurity Officer will Plan and coordinate the IT security programs and policies. Manage and control changes to the system and assessing the security impact of those changes. Manage and control changes to the system and assessing the security impact of those changes. Obtain CA for systems under their purview. Provide support for a program, organization, system, or enclaveaposs information assurance program. Serve as the Approval Authority for systems under their control Ensure that the architecture and design of DoD information systems are functional and secure As needed, design and develop IA or IA enabled products, interface specifications, and approaches to secure the environment Assess threats to the environment Develop and update the system security plan and other IA documentation Provide inputs on the adequacy of security designs and architectures Participate in risk assessment during the certification and accreditation process Provide support for a program, organization, system or enclaveaposs information assurance program Provide security certification test and evaluation of assets, vulnerability management and response, security assessments, and customer support Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed Assist with the management of security aspects of the information system and performs day-to-day security operations of the system Evaluate security solutions to ensure they meet security requirements for processing classified information Provide configuration management (CM) for information system security software, hardware, and firmware Prepare documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (CA) packages, and Systems Requirements Traceability Matrices (SRTMs) Provide support to the Information Systems Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave Develop and maintain documentation for CA in accordance with ODNI and DoD policies Provide CM for security- relevant information system software, hardware, and firmware Assist with the management of security aspects of the information system and perform day-to-day security operations of the system Develop system security policy and ensures compliance. Administer the user identification and authentication mechanism of the information systems Interact with customers, IT staff, and high-level corporate officers to define and achieve required IA objectives. Provide daily oversight and direction to contractor Cybersecurity Officers. Serve as an Information Systems Security Manager (ISSM) Desirable Skills Experience Possess working knowledge of Assessment and Authorization practices within DoDI8510.01, ICD 503, CNSSI 1253, and the Risk Management Framework (RMF) process including various security tools (ACAS, HBSS, etc). Knowledge of data security administration principles, methods, and techniques Familiarity with domain structures, user authentication, and digital signatures Understanding of DHSDoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policies Certification(s) DoD 8570.01-M IAT or IAM Level III Computing Environment (CE) Certification as determined by the Program Manager is required prior to support on contract Required Security Environment Certification CompTIA Security+ CE or equivalent Computer Environment Certification CASP CE, CISSP, or equivalent Security Clearance TSSCI required Additional Candidates must be willing and able to attain a CI Polygraph for certain positions as determined by the contract High School DiplomaGED with 10 years of related experience, or Associateaposs Degree with 8 years of experience, or Bacheloraposs Degree with 6 years of experience, or Masteraposs Degree with 4 years of experience DefenseCamp Belvoirregion OpportunityOwned GDITCareers GDITLife WeAreGDIT DPOST DefenseCampFtBelvoir GDITINSCOM I2TS3 Scheduled Weekly Hours 40 Travel Required Less than 10 T elecommuting Options Telecommuting Not Allowed Work Location USA VA Fort Belvoir Additional Work Locations We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.GDIT is an Equal OpportunityAffirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.