Information Security Analyst, Journeyman (PMA 271)

Davis Defense GroupCalifornia, MD
1d$105,000 - $125,000Onsite

About The Position

As an Information Security Analyst, ensure compliance with DoD cybersecurity policy and technical cybersecurity solutions. Work within USSTRATCOM and Nuclear, Command, Control, and Communications (NC3) cybersecurity methodologies. Lead or participate in teams to achieve and maintain system ATO and other applicable cybersecurity policies. Regularly interact with senior leadership, information technology professionals, IPT Leads, and other stakeholders. The incumbent works in a fast-paced office environment that demands attention to detail, professionalism, and leadership.

Requirements

  • Minimum of three years’ experience performing duties described in the functional description.
  • Level 2 certifications (IAM II and or IAT II) under DoD 8570 and DoD 8140 (or ability to obtain within 6 months of filling the position).

Nice To Haves

  • Experienced in the design, analysis and fielding of secure system architectures, software and networks.
  • Advanced knowledge of DOD Risk Management Framework (RMF).
  • Advanced knowledge of DOD cybersecurity policy or technical cybersecurity solutions.
  • Experienced with CISCO routers and switches.
  • Experience with Windows and Linux operating systems.
  • Demonstrated work experience with usage of Assurance Compliance Assessment Solution (ACAS).
  • Demonstrated work experience with mitigating STIG findings and/or assistance with mitigation statements.
  • Experienced with Enterprise Mission Assurance Support System (eMASS).
  • Experienced with Vulnerability Remediation Asset Manager (VRAM).
  • Experienced with Microsoft Office Tools including Word, Excel, PowerPoint and Visio.

Responsibilities

  • Support the certification process and testing in accordance with the Risk Management Framework (RMF) and National Institute of Standards and Technology (NIST) policy.
  • Provide the analysis and evaluation to design, implement, test and field secure systems, networks, and architectures.
  • Enforce information systems security policies ensuring system security requirements are addressed during all phases of the Information System (IS) life cycle.
  • Evaluate and recommend actions in the prioritization and deconfliction of system security engineering requirements.
  • Identify vulnerabilities and deficiencies and provide recommended actions and risk mitigation steps.
  • Implement and ensure information systems security policies and security requirements are addressed during all phases of the acquisition and Information System (IS) lifecycle.
  • Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information.
  • Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies.
  • Assist the government in preparing documentation supporting Authority to Operate (ATO) requirements for developmental hardware, software, and facilities.
  • Support system security engineering, integration management solutions, mitigation strategies to reduce cyber-attacks risk.
  • Track and monitor Plan of Action and Milestones (POA&Ms) for IT system accreditations.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service