[Close] 

Sr Info Security Analyst-CND-SP

Job Description:

Contract: I2TS 3

Position Title:
Sr Analyst, Information Security Cybersecurity-Computer Network Defense Service Provider (CND-SP) Auditor/Inspector (L3)

Location: Fort Bragg, NC

GENERAL SUMMARY:

GDIT is seeking candidates to support the US Army Intelligence and Security Command (INSCOM). Under the I2TS 3 task order, INSCOM ensures reliable, uninterrupted availability of Command, Control, Communications, Computers, and Information Management (C4IM) including: networks, hardware, software, engineering, and specialized tools at the point of customer need to support INSCOM's mission. INSCOM and its MSCs provide the enabling layer to connect the Army and its tactical formations to defense and national intelligence agencies via tactical networks. The ability to provide mission critical intelligence is dependent on the successful use of its information technology (IT) networks worldwide.

Principal Duties and Responsibilities:

An I2TS 3 Cybersecurity-Computer Network Defense Service Provider (CND-SP) Auditor/Inspector will:

  • Identify and manage network and system vulnerabilities and security events
  • Receive, acknowledge, disseminate, track, report (daily/weekly, and update vulnerability management (VM) alerts, vulnerability assessments, red/blue team events, security incidents, and the VM common operating picture (VM COP)
  • Provide inspection services across the enterprise on behalf of the organization s Special Enclave (SE) program manager
  • Support or perform global DoD inspections of GENSER and SE (e. g., JWICS) services to ensure compliance to DoDI 8530 standards

Skills / Experience:

  • Possess working knowledge of Assessment and Authorization practices within DoDI8510. 01, ICD 503, CNSSI 1253, and the Risk Management Framework (RMF) process including various security tools (ACAS, HBSS, etc).
  • Knowledge of data security administration principles, methods, and techniques
  • Familiarity with domain structures, user authentication, and digital signatures
  • Understanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policies

Certifications:

  • DoD 8570. 01-M IAT or IAM Level III Computing Environment (CE) Certification as determined by the Program Manager is required prior to support on contract
  • Required Computer Environment Certification: CISM, CASP CE, Associate of (ISC)2, CISSP, or equivalent

Security Clearance:

  • TS/SCI required

Additional:

  • Candidates must be willing and able to attain a CI Polygraph for certain positions as determined by the contract
  • Travel may be required to support the mission

Education

Education Required:

  • High School Diploma/GED with 10 years of related experience, or Associate s Degree with 8 years of experience, or Bachelor s Degree with 6 years of experience, or Master s Degree with 4 years of experience

Qualifications

4-10 years of related experience in data security administration.

As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors. With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.

#I2TS3 #CJPOST #CPOST #dpost



Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Technical Services Engineer, SR (A&P Shift Lea...
Fayetteville, NC NANA Regional Corporation
Sr. Operator Specialist (OM)
Greensboro, NC Pactiv
Sr. Repair Technician - Paint 2nd Shift
Asheville, NC Thermo Fisher Scientific
Security Host - The Queen
Wilmington, NC LIVE NATION, INC
Public Relations Senior Analyst
Mooresville, NC LOWE'S
Sr. Merchandising Manager
Charlotte, NC Electrolux Home Products, Inc.