Cyber Security Analyst

Location
Arlington, Virginia
Posted
Mar 30, 2021
Closes
May 04, 2021
Ref
16940
Function
Administrative
Hours
Full Time
Summary

The Cyber Security Analyst will provide expert consultation across a wide range of cross-functional areas of Cybersecurity (CS) services. The Cyber Security Analyst will provide project planning, guidance, and technical expertise in the areas of program, policy, process and planning, risk management, auditing and assessments, Assessment and Authorization (A&A), and quality planning and control of all products. The Cyber Security Analyst will provide proficiency with managing and enforcing of security strategies and policies. The Cyber Security Analyst will assess and provide a mitigation plan for system security threats and risks throughout the program life cycle and validate system security requirements definition and analysis. The Cyber Security Analyst will create security engineering data flow designs supporting all aspect of Information Assurance and Information Security (InfoSec).

Responsibilities
  • Assist with development and maintain Operational Level Agreements (OLAs) and end-to-end Standard Operating Procedures (SOPs), to identify collaborative responsibilities and support process interaction with other government and IT contractor groups.
  • Develop and maintain a detailed policy matrix mapping federal, DoD, and local policies to the required security controls as identified by National Institute of Standards and Technology (NIST) SP 800-53 and DoDI 8510.01.
  • Documents include but are not limited to:
  • Standard Operating Procedures (SOPs)
  • Agency Training (e.g., cyber awareness, computer incidents, malicious codes, etc.)
  • Contingency Plan
  • Security Assessment Report (SAR)
  • Cybersecurity Instruction
  • Concept of Operations (CONOPS)
  • Incident Response Plan (IRP)
  • Configuration Management Plan (CMP)
  • System Authorization Access Request (SAAR)
  • Vulnerability Management Plan
  • System Security Plans (SSP)
  • Plan of Actions and Milestones (POAMs)
  • Administer CS training, including the annual Cyber Awareness Challenge training per DoDD 8500.1, compliance with the requirements of DoDD 8570.1, and DoD 8570-M for the IA Workforce Improvement Program (WIP).
  • Provide operational risk management support for CS-managed systems whether networked or standalone.
  • Support networks, including varying security classifications, architectures, mobile devices, Virtual Private Networks (VPNs), and other remote access architectures and technologies, including Secure Socket Layer.
  • Provide CS' portion of the Tier 3 Computer Network Defense (CND) services in accordance with DoDI O-8530.2, CJCSI 6510.01E, and CJCSM 6510.01.
  • Support enterprise level Information Assurance Vulnerability Management (IAVM) and DoD Reporting Management and Support, including vulnerability management oversight activities for all assets in the "Test" and "Production" enclaves and all standalone systems.
  • Participate in the CS change management process, including attending the weekly Enterprise Change Control Board (ECCB) meetings, reviewing Requests for Change (RFCs) distributed in email, and performing risk assessments on hardware and software.
  • Evaluate all newly deployed servers and applications in the "Test" and "Production" enclaves and verify that the asset entries have been created in the DoD DPMS and ensure vulnerabilities have been mitigated and STIGs have been applied.
  • Review applications by performing an automated and/or manual scan of the application code and report findings in the application code scan to the SA for developer or remediation.
  • Plan and execute compliance Assessment and Authorization (A&A) activities in support of CIO's role as AO for client and its subcomponents, including performing system registration in eMASS on behalf of the system owner, performing system registration in DITPR on behalf of the system owner, updating eMASS with IA Controls on behalf of system owner, updating eMASS POA&M information when required on behalf of the system owner, testing and validating NIST 800 53 rev 4 Security Controls, and providing support for the DoD Risk Management Framework (RMF) for all Information Systems (IS), enclaves, and application systems under the purview of the CIO per DoDI 8510.01.
  • Other duties as assigned

Qualifications
  • High school diploma or GED required
  • 10+ years of demonstrated experience in Information Technology (IT) with at least 5 of those 10+ years managing IT projects or programs focused on interpreting and applying DoD Cybersecurity (CS) policy and guidance to operational DoD IT environments.
  • Experience in at least 8 of the following 15 areas of expertise:
  • Current Microsoft server and workstation OS security configurations
  • Current Red Hat Linux Enterprise OS security configurations
  • Current Unix OS security configurations
  • Current Microsoft server and desktop application security
  • VMWare security
  • Database security (e.g., Oracle, MS SQL, MS Access)
  • Border device security (e.g., firewall, VLANs, IP Subnetting, Ports and protocols)
  • Encryption standards
  • Vulnerability scanning using approved DoD scanner
  • Application code scanning with Fortify or other industry standard product
  • HBSS monitoring
  • Auditing (e.g., system accounts, security logs, system and network anomalies)
  • Working knowledge of DoD Components
  • Metrics - capture and documentation
  • Technical writing - technical documents and user training materials
    • Experience required with the analysis, design, and implementation of security procedures of hardware and software on complex, large-scale systems in an enterprise environment.
    • Average literacy with the MS Office Suite applications of Outlook, Word, Access, and PowerPoint.
    • Proficient with Excel to perform data evaluation, formulas, and analytics (e.g. able to transfer presentation graphics from Excel into PowerPoint or Word)
    • Must have and maintain: DoDD 8570.1/DoD 8570.01-M certification requirements for the IA Manager (IAM) Level II or DoDD 8570.1/DoD 8570.01-M certification requirements for IAT III.
    • Technical writing experience preferred. Risk Management Framework (RMF) and Policies.
    • Secret clearance required.

    Knowledge, Skills and Abilities
    • Bachelor's degree in Computer Science, Cyber Security or a related field is preferred.
    • Knowledge and experience with current NIST Federal Information Processing Standards (FIPS) and Special Publications (SP), including SP800-18, SP800-37, SP800-53, SP800-53A, SP800-60, FIPS-199, FIPS-201, FIPS-140-2, DoDI 8510.01.and other DoD and IC policies and their application to enterprise IT security.
    • Knowledge and experience with federal and industry standard Cybersecurity frameworks, including NIST, FEDRAMP, FISMA, GDPR, HIPPA, COBIT, CIS, and CISQ.
    • Ability to provide integration of security requirements into customer process improvement efforts according to the security policy framework.
    • Knowledge of IT security strategy, cyber security, and compliance and risk management, including IT Security.
    • Knowledge and experience in security testing and security management using tools like NESSUS and HP Web Inspect.
    • Proficient knowledge of EMASS, SNAP, DITPR, PPSM, and other DOD authoritative Databases.

    #Chenega Decision Sciences, LLC

    Similar jobs