Job Details

Sr. Cyber Security Officer - TS/SCI required

Advertiser
General Dynamics Information Technology
Location
Fort Belvoir, Virginia, United States
Rate
-
Type of Requisition:RegularClearance Level Must Currently Possess:Top Secret/SCIClearance Level Must Be Able to Obtain:Top Secret/SCISuitability:No Suitability RequiredPublic Trust/Other Required:NoneJob Family:Information SecurityJob Description:GENERAL SUMMARY:GDIT is seeking candidates to support the US Army Intelligence and Security Command (INSCOM). Under the I2TS3 task order, INSCOM ensures reliable, uninterrupted availability of Command, Control, Communications, Computers, and Information Management (C4IM) including: networks, hardware, software, engineering, and specialized tools at the point of customer need to support INSCOM's mission. INSCOM and its MSCs provide the enabling layer to connect the Army and its tactical formations to defense and national intelligence agencies via tactical networks. The ability to provide mission critical intelligence is dependent on the successful use of its information technology (IT) networks worldwide.Principal Duties and Responsibilities:An I2TS 3 Cybersecurity Officer will:Plan and coordinate the IT security programs and policies. Manage and control changes to the system and assessing the security impact of those changes. Manage and control changes to the system and assessing the security impact of those changes. Obtain C for systems under their purview. Provide support for a program, organization, system, or enclave's information assurance program. Serve as the Approval Authority for systems under their controlEnsure that the architecture and design of DoD information systems are functional and secureAs needed, design and develop IA or IA enabled products, interface specifications, and approaches to secure the environmentAssess threats to the environmentDevelop and update the system security plan and other IA documentationProvide inputs on the adequacy of security designs and architecturesParticipate in risk assessment during the certification and accreditation processProvide support for a program, organization, system or enclave's information assurance programProvide security certification test and evaluation of assets, vulnerability management and response, security assessments, and customer supportProvide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologiesMaintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followedAssist with the management of security aspects of the information system and performs day-to-day security operations of the systemEvaluate security solutions to ensure they meet security requirements for processing classified informationProvide configuration management (CM) for information system security software, hardware, and firmwarePrepare documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C) packages, and Systems Requirements Traceability Matrices (SRTMs)Provide support to the Information Systems Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclaveDevelop and maintain documentation for C in accordance with ODNI and DoD policiesProvide CM for security- relevant information system software, hardware, and firmwareAssist with the management of security aspects of the information system and perform day-to-day security operations of the systemDevelop system security policy and ensures compliance. Administer the user identification and authentication mechanism of the information systemsInteract with customers, IT staff, and high-level corporate officers to define and achieve required IA objectives. Provide daily oversight and direction to contractor Cybersecurity Officers. Serve as an Information Systems Security Manager (ISSM) Desirable Skills / Experience:Possess working knowledge of Assessment and Authorization practices within DoDI8510.01, ICD 503, CNSSI 1253, and the Risk Management Framework (RMF) process including various security tools (ACAS, HBSS, etc).Knowledge of data security administration principles, methods, and techniquesFamiliarity with domain structures, user authentication, and digital signaturesUnderstanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policiesCertification(s):DoD 8570.01-M IAT or IAM Level III Computing Environment (CE) Certification as determined by the Program Manager is required prior to support on contractRequired Security Environment Certification: CompTIA Security+ CE or equivalentComputer Environment Certification: CASP CE, CISSP, or equivalentSecurity Clearance:TS/SCI requiredAdditional:Candidates must be willing and able to attain a CI Polygraph for certain positions as determined by the contractHigh School Diploma/GED with 10 years of related experience, or Associate's Degree with 8 years of experience, or Bachelor's Degree with 6 years of experience, or Master's Degree with 4 years of experience#DefenseCamp #Belvoirregion #OpportunityOwned #GDITCareers #GDITLife #WeAreGDIT #DPOST #DefenseCampFtBelvoir #GDITINSCOM #I2TS3Scheduled Weekly Hours:40Travel Required:Less than 10%Telecommuting Options:Telecommuting Not AllowedWork Location:USA VA Fort BelvoirAdditional Work Locations:We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.

Send application

Mail this job to me so I can apply later

Apply With CV

You are not logged in. If you have an account, log in to your account. If you do not have an account, why not sign up? It only takes a minute!

latest videos

Upcoming Events