Information Systems Security Officer
4 days left
- Full Time
GDIT seeks an Information Security Analyst to be a part of a security team that supports the projects' information security needs to comply with the US Post Office comprehensive security programs and the NIST Risk Management Framework (RMF). The Information Security Analyst must:
- Prepare, validate, and maintain security documentation including, but not limited to: system security plan (SSP), risk assessment (RA), contingency plan (CP), privacy impact assessment (PIA), and FIPS categorizationProvide support for the security life cycle of major applications to the project team and client stakeholdersCollaborate with the project team to support security assessments (Security Assessment and Authorization [SA&A] or Certification and Accreditation [C&A] activities) and auditsHave strong analysis, oral and written communication, and change management skillsBe able to work with all levels of client project team members and establish and maintain a strong customer-focused working relationshipIdentify and mitigate security business and system risks especially if different from risks managed at the project levelIdentify and manage POA&Ms through remediation as well as develop corrective action plans for each POA&M Be a team player with the ability to work independently and proactively while being flexible and prioritizing competing priorities, often under time constraintsUnderstanding of NIST Special Publications Preparing security documentation Assists with implementation of counter-measures or mitigating controls.Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.Evaluate firewall change requests and assess organizational risk.Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.Assists with implementation of counter-measures or mitigating controls.Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.Prepares incident reports of analysis methodology and results.Maintains current knowledge of relevant technology as assigned.Participates in special projects as required.