Supports the system/application assess and authorize (A&A) effort, to include assessing and guiding the quality and completeness of A&A activities, tasks and resulting artifacts mandated by governing DoD and DAF policies.
Recommends policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data.
Conducts risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs.
Promotes awareness of security issues among management and ensuring sound security principles are reflected in organizations\' visions and goals.
Conducts systems security evaluations, audits, and reviews.
Recommends systems security contingency plans and disaster recovery procedures.
Recommends and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures.
Participates in network and systems design to ensure implementation of appropriate systems security policies.
Facilitates the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes.
Assesses security events to determine impact and implementing corrective actions.
Ensures the rigorous application of information security/cybersecurity policies, principles, and practices in the delivery of all IT services.
Performs Information System Security Manager (ISSM) duties as outlined in DoDI 8510.01 for assigned systems/applications.
Provides daily supervision and direction to staff.
Minimum Clearance: Top Secret
Certification:
DoDD 8570.01M Information Assurance Manager level III baseline certification required.
TESA eligibility/certification required.
Required Experience: This position requires a minimum of 12 years\' experience, of which at least eight years must be specialized experience in defining computer security requirements for high level applications, evaluation of approved security product capabilities and resolution of computer security problems.
Extensive knowledge and proficiency with the Risk Management Framework (RMF) and eMASS or XACTA experience.
Extensive knowledge and proficiency with the Assured Compliance Assessment Solution (ACAS) Vulnerability Scanner
Expert knowledge and proficiency with Cybersecurity best practices.
Expert knowledge and understanding of Federal and DoD Cybersecurity regulations and policies.
Minimum Education: A Bachelor\'s degree in computer science/systems, information systems/ technology, engineering/engineering technology, software engineering/programming, management, natural sciences, social sciences, mathematics, or business/finance is required.
Education and experience requirements may be substituted with:
A Master\'s degree (in subjects described above) and eight years general experience of which at least seven years must be specialized experience.
A Ph.D. (in subjects described above) and six years general experience of which at least five years must be specialized experience.
No degree and thirteen years general experience of which at least eleven years is specialized.
Work Requirements
.cls-1{fill:none;stroke:#5b6670;stroke-miterlimit:10;stroke-width:2px;} Years of Experience 10 + years of related experience
may vary based on technical training, certification(s), or degree
.cls-1{fill:none;stroke:#5b6670;stroke-miterlimit:10;stroke-width:2px;} Travel Required Less than 10%
.cls-1{stroke-width:1.5px;}.cls-1,.cls-2,.cls-3{fill:none;stroke:#5d666f;stroke-miterlimit:10;}.cls-2{stroke-width:2px;} Citizenship U.S. Citizenship Required
About Our Work
We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.\n \n \n \n \n \n