GDIT is your place. Make it your own by discovering new ways to apply the latest technologies securely and expertly. By owning your opportunity at GDIT, you'll become a critical part in how we successfully solve our clients' biggest challenges and deliver on promise. Our work depends on a Cybersecurity Analyst joining our team to support Government activities in Sterling, V.A. or Annapolis Junction, M.D. At GDIT, we foster a people-focused and customer-centric environment in delivering Engineering Support Services. As a Cybersecurity Analyst supporting the Government, you will be trusted with ensuring our IT engineering solutions meet the highest security standards, that they adhere to all applicable standards, guidelines, and mandates; and that all appropriate documentation to make up a Body of Evidence (BoE) is provided to the Government. In this role, a typical day may include: Acting as an appointed Information System Security Officer (ISSO) for IC cyber systems being developed by the engineering team Reporting, documenting, and briefing the status of systems under development, while assuring their successful and timely progression through the clients' Risk Management Framework (RMF) to the satisfaction of the appointed Information System Security Manager (ISSM), and/or Senior Government leadership Providing clear justification satisfying all applicable security control implementation as specified by the IC, AO, or NIST-800-53, rev 4 rev 5 Authoring System Security Plans (SSP) and System Security Test Plans (SSTP) Conducting self-assessments of all systems under development Analyzing security controls and the impacts the changes would have on the environment Preparing for and assisting with formal risk assessments conducted by the AO's designated Security Control Assessors (SCA) while acting as a member of the security assessment test team Ensuring the remediation of any findings assigned to engineering as documented in the Security Assessment Report (SAR) and its Plan of Actions and Milestones (PO&AM) Documenting and defending reasoning when waivers are sought, or non-standard remediation solutions are requested for specific security controls Assisting with the transition of systems granted an ATO to the Operations branch and the assignment of an operations ISSO Researching remediation options for vulnerabilities identified for systems under development or already in production under an ATO