Job Search
Returning applicant?  Login Now                       New Job Search                                                     

Sr. IA Security - Joint Staff Contract
Security Clearance:Top Secret
FT/PT Status:Full Time Employment
Job Code:2017:21INFOSY-016
Essential Duties & Responsibilities:
8570 IAT Level 2 compliant - CISSP REQUIRED

JOB SUMMARY:Assists with planning, organizing, and managing security, disaster recovery, and similar functions related to information systems. Ensures that data systems and databases are protected from unauthorized users. Responsible for applying sound Information Assurance practices, intrusion detection, and maintaining information security administration for computer networks, LAN/WAN systems, internet and server systems.

ESSENTIAL DUTIES AND RESPONSIBILITIES: (Duties and responsibilities which occupy a major portion of time and importance in the job. Incumbent may perform one or more of the following duties.)a. Evaluates the effectiveness and efficiency of existing security control measures. Identifies vulnerabilities that may cause inappropriate or accidental access, destruction, or disclosure of information and establishes security controls to eliminate or minimize exposures.b. Performs established auditing and monitoring analysis to verify compliance with established security policies and notifies appropriate individuals of violations.c. Organizes the security investigation and implementation of corrective actions. d. Assists with documentation all inquiries relating to any perceived or alleged security breaches.e. May assist with maintaining training and awareness programs to ensure owners and clients are aware of their responsibilities.f. Assists and advises user departments in appropriate security and disaster recovery procedures.g. May make written and oral presentations on security issues.

SUPERVISION/FINANCIAL RESPONSIBILITIES:a. Supervisory Responsibility – None b. Supervision Received – Reports to Lead Information Security Analyst or Project/ Program Manager; receives assignments from supervisor; work is reviewed for results .c. Financial Responsibility – None
Required Qualifications:
8570 IAT Level 2 compliant -  CISSP CERTIFICATION is Required, OS is desired

Required Skills:

*       Must have experience with the implementation, administration and maintenance of McAfee ePolicy Orchestrator (ePO) and supporting modules to include ABM (Asset Baseline Auditor), ACCM (Asset Configuration Compliance Module), DCM (Device Control Module), VSE (VirusScan Enterprise), HIP (Host Intrusion Prevention), PA (Policy Auditor), and RSD (Rogue System Detection) as well as firewall interoperability and policy creation.

*       Working knowledge of STIGs, FRAGOs, TASKORDs, and OPORDs. 

*       The position requires working knowledge and experience in TCP/IP and network protocols

*       Working knowledge of Linux and Windows security configuration and system administration experience. 

*       Participate in all aspects of network security including intrusion detection, incident response, vulnerability assessment, and vulnerability research.

*       Excellent customer service and written/verbal communication skills.

This candidate must be able to operate with minimal supervision, develop and prepare reports as well as present the data in an articulate manner (good communications). Configure, install, manage the day to day operations of HBSS in a large DoD Enterprise environment- to include unclass and classified enclaves. Must be 8570 compliant, IAT2 minimum, CISSP desired, but not required.- Education/Experience – B.S. in Information Technology or related field, plus five to seven years of applicable experience. Relies on experience and judgment to plan and accomplish goals. Knowledge of IT security principles and practices and the ability to evaluate the effectiveness and efficiency of existing security control measures. Familiar with: network security, database principles, security architectures, and TCP/IP. Knowledge of DoD IA regulations. Experience with DITSCAP and DISA accreditation (IAVA and STIGS). Familiar with virus detection and corresponding remedial actions, protection against cyber attacks and installation and of latest COTS/GOTS (DISA) software. Relevant and equivalent experience may be substituted for degree requirement.

 Skills/Certifications/Training – MCP or MCSE preferred; CISSP Required, Security+CE, SANS/IAC training highly desirable.-

 Level of Security Clearance - Top Secret [minimum]
Preferred Skills & Certifications:
WORKING RELATIONSHIPS/WORKING ENVIRONMENT:a. Internal Interaction -b. External Interaction -c. Physical Demands – Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.d. Working Conditions – Normal working conditions. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

EOE - Females/Minorities/Protected Veterans/Individuals with Disabilities