Cybersecurity - IA Support TS/SCI - Hawaii
Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
1. Performs Cybersecurity activities (formally known as IA - Information Assurance) for a large Program; coordinates with government Program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures.
3. Conduct network and system audits for vulnerabilities using Security Technical Implementation Guides (STIGs), ACAS vulnerability scanner, and DISA SCAP to mitigate those findings for Solaris, Linux, Windows, and associated network operating systems.
4. Ability to create, track and review Plan of Action and Milestones (POA&Ms) and conduct solution identification to assist in problem remediation and resolution.
5. Communicate tactical and strategic threat information to Government leaders, Cybersecurity-Ops and A&A (formerly C&A) Staff to assist them in making cyber risk decisions and to mitigate threats.
6. Carries out DoD Risk Management Framework (RMF) in accordance with DoDi 8510 to ascertain information systems' security posture by utilizing security control validation activities and coordinating security testing.
7. Experience utilizing Security Event generating sources (e.g. Firewalls, IDS, Routers, Security Appliances, HBSS, ACAS).
8. Expertise in the following concepts is also desired for the successful candidate: DNS security practices, advanced log analysis, network monitoring, network flow analysis, packet capture analysis, network proxies, firewalls, anti-virus capabilities, Linux/UNIX command line, and access control lists.
9. Working Knowledge of UNIX/LINUX/Windows/Networking/Database (MS-Access, MS T-SQL and Oracle).
10. The ability to work and set priorities on multiple projects/tasks at once and operate in a dynamic, fast-paced team-oriented environment.
11. Maintain the Security Accreditation status, including system documentation of multiple DoD classified networks and interconnected systems.
12. Coordinates with OUSDI, USAF, DISA, and other organizations in support of audits and inspections and provides all necessary documentation as required for SAVs, ST&Es, and CCRI.
13. Participates in special projects as required.
14. IAM Level II required in accordance with DOD 8570.1M.
2. Certification in one or more specific technologies may be required, depending on job assignment.
Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.
8-10 years of related experience in data security administration.
1. Advanced knowledge of data security administration principles, methods, and techniques.
3. Requires familiarity with domain structures, user authentication, and digital signatures.
4. Requires understanding of firewall theory and configuration.
5. Requires understanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policies.
As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities.