Information Security Analyst
Role details
Job location
Tech stack
Job description
Advance your career while impacting our national security in cyber as an Information Security Analyst Principal at GDIT. Here, technologists have many paths to grow a meaningful career supporting cyber missions and operations across the federal government., The Information Security Analyst performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems, network, databases, and Web-based security., The IA Analyst is responsible for assisting the ISSM in ensuring that a Certification and Accreditation package is prepared and maintained in accordance with (IAW) the DoDI 8510.01 Risk Management Framework (RMF) for DoD Information Technology (IT).
- Verify systems in APMS and process each accreditation package in eMASS under the RMF.
- Collect artifacts and develop/refine COOP/DRP; System Security Plans and Standard Operating Procedures as needed to ensure compliance with NIST SP 800-53 and CNSSI 1253.
- Ensure all IA/Cybersecurity Controls for assessment and authorization are met and ultimate submission of package to the AO for an Approval to Operate on all Software and Hardware.
- Perform Security Control Assessor (SCA-V) duties
- Perform RMF Assessment and Authorization (A&A) validations.
- Perform pre-validation A&A that includes performance of A&A testing and vulnerability scanning in order to validate IA policy; regulation; Security Technical Implementation Guide (STIG); and Best Business Practice (BBP) compliance.
- Generate Evaluation Risk Reports and scorecards.
- Performs Computer Security Incident Response activities for a large organization; coordinates with other government agencies to record and report incidents.
- Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
- Recognizes potential; successful; and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
- Evaluate firewall change requests and assess organizational risk.
- Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure; applications and operating systems.
- Assists with implementation of counter-measures or mitigating controls.
- Ensures the integrity and protection of networks; systems; and applications by technical enforcement of organizational security policies; through monitoring of vulnerability scanning devices.
- Performs periodic and on-demand system audits and vulnerability assessments; including user accounts; application access; file system and external Web integrity scans to determine compliance.
- Prepares incident reports of analysis methodology and results.
- Provides guidance and work leadership to less-experienced technical staff members; and may have supervisory responsibilities.
- May serve as a technical team or task leader.
- Maintains current knowledge of relevant technology as assigned.
- Participates in special projects as required.
Requirements
-
Education: Bachelors Degree in Computer Science or a related technical discipline; or the equivalent combination of education; professional training or work experience
-
Experience: 8-10 years of related experience in data security administration; 2 or more years direct C&A/A&A experience.
-
Technical skills: IAM Level III certification required (CISSP/CISM/GSLC); Experience performing as an ACA/SCA-V. Experience with cloud technology (A&A).
-
Security clearance level: Active Secret Clearance with ability to obtain a Top Secret
-
US citizenship required
-
Role requirements: Must be approved for German TESA; must obtain ITIL Foundation required within 90 days of hire. This position may occasionally require some physical activity; lifting objects; bending; crouching down (i.e. to troubleshoot equipment); and long periods of sitting., 8 + years of related experience
-
may vary based on technical training, certification(s), or degree Certification
Certified Information Systems Security Professional (CISSP) | International Information System Security Certification Consortium (ISC2) - International Information System Security Certification Consortium (ISC2) Travel Required
Less than 10% Citizenship
Benefits & conditions
At GDIT, the mission is our purpose, and our people are at the center of everything we do.
- Growth: AI-powered career tool that identifies career steps and learning opportunities
- Support: An internal mobility team focused on helping you achieve your career goals
- Rewards: Comprehensive benefits and wellness packages, 401K with company match, and competitive pay and paid time off
- Community: Award-winning culture of innovation and a military-friendly workplace
OWN YOUR OPPORTUNITY Explore a career in cyber at GDIT and you'll find endless opportunities to grow alongside colleagues who share your focus on defending and protecting what matters.
Work Requirements
Years of Experience, The likely salary range for this position is $107,744 - $143,750. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Total compensation for international positions varies by tax, social security, and immigration statuses, as well as location. Generally, an international assignment may include allowances, premium uplifts, and/or relocation or transportation benefits, above base salary range noted.