Post-Quantum Data Security SME

General Dynamics Information Technology
Onsite

About The Position

Command is responsible for strategic deterrence, nuclear operations, and enterprise IT services essential to national security. It supports Nuclear Command, Control, and Communications (NC3), Joint Electromagnetic Spectrum Operations (JEMSO), Global Strike, and Missile Threat Assessments, working closely with other Combatant Commands, Services, and defense agencies. Contract personnel will provide key components to ensure mission success and the safety of the U.S. and its allies by providing 24/7 IT & AV services and network support for NIPRNet, SIPRNet, JWICS, and SAP/SAR environments. Identifies and addresses security risks related to data, models, and algorithms in the AI pipeline. Specializes in preventing unauthorized access, data breaches, and cyber threats that could compromise AI assets. Secures data used in model training, testing, and deployment. Ensures that data handling practices align with security policies and mitigate risks related to data exposure and integrity. Focuses on security policies, data encryption, vulnerability assessments, and compliance with security standards. Monitors and audits database access and security logs, identifying and addressing potential vulnerabilities. Performs intrusion detection activities and access control assessments and enforces security best practices.

Requirements

  • Technical Training, Certification(s) or Degree, 10+ years of experience
  • Security Clearance Level: Top Secret with SCI eligibility
  • Required Certifications: ITIL 4 Foundation within 9 months of hire; CCSP within 6 months of hire
  • US Citizenship Required

Responsibilities

  • Identifies and addresses security risks related to data, models, and algorithms in the AI pipeline.
  • Specializes in preventing unauthorized access, data breaches, and cyber threats that could compromise AI assets.
  • Secures data used in model training, testing, and deployment.
  • Ensures that data handling practices align with security policies and mitigate risks related to data exposure and integrity.
  • Focuses on security policies, data encryption, vulnerability assessments, and compliance with security standards.
  • Monitors and audits database access and security logs, identifying and addressing potential vulnerabilities.
  • Performs intrusion detection activities and access control assessments and enforces security best practices.

Benefits

  • Full-flex work week to own your priorities at work and at home
  • 401K with company match
  • Comprehensive health and wellness packages
  • Internal mobility team dedicated to helping you own your career
  • Professional growth opportunities including paid education and certifications
  • Cutting-edge technology you can learn from
  • Rest and recharge with paid vacation and holidays

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service