Information Security Analyst Senior

Clearance Level
Top Secret/SCI
Category
Information Security
Location
Tampa, Florida
(Onsite Workplace)
Key Skills For Success

Cybersecurity

Information Assurance

Plan of Action and Milestones (POA&M)

Risk Management Framework

REQ#: RQ195160
Public Trust: None
Requisition Type: Regular
Your Impact

Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.

Job Description

Responsibilities:

Strategy & Planning

  • Supports enterprise information security standards.
  • Demonstrates ability to perform complex security analysis of classified and unclassified applications, systems, and enclaves for compliance with downward directed and US BICES program centric security requirements.
  • Coordinates with Project Managers (PjM), technologies SMEs (Network, Systems, Cyber Defensive Operations) and other stake holding teams to ensure Cybersecurity dependencies and deliverables are met.
  • Supports all gates (KO, SRR, PDR, CDR, TRR, TAR, OAR and PFR) of projects undergoing the USBICES System Engineering Management Plan (SEMP) .
  • Attends internal, customer facing and vendor meetings to coordinate project activities, status reports or technical exchange engagements with industry partners.
  • Validates and verifies system security requirements definitions, analyzes and establishes system security designs and makes recommendations on solutions to meet security requirements.
  • Collects, organizes and delivers diverse technical information on proposed enterprise solution or changes to satisfy the cybersecurity project requirements.
  • Demonstrates knowledge of Systems and Networks technologies concepts and operations and can relate this knowledge to cybersecurity dependencies and requirements.
  • Critically reviews provided Security Technical Implementation Guides technologies checklist and provides feedback on Vulnerabilities Identifiers (VUL ID) that do not meet enterprise standards or configuration.
  • Responsible for the creation of Security Impact Analysis (SIA) document leveraging provided artifacts and works in concert with the A&A branch to obtain ISSO/M approval.
  • Helps to develop and advise on the implementation of information security standards.
  • Provides tactical and strategic information security advice and examining the ramifications of new technologies.
  • Performs all procedures necessary to ensure the security of information systems assets and to protect systems from intentional or inadvertent access or destruction.
  • Ability to provide an independent assessment and ensure security controls are implemented correctly, operating as intended, and are producing the desired outcome.
  • Maintains current knowledge of relevant technology as assigned.
  • Completes weekly and monthly reporting requirements.
     

Operational Management

  • May serve as a focal point of contact for the information security team and the customer/organization.
  • Advises on physical security, disaster recovery, and data backup systems.
  • Manages security audits and vulnerability and threat assessments, and directing responses to network or systems intrusions
  • Ensures that all information security systems are functional and secure.
  • Provides training to information security personnel.
  • Assesses current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement.
  • Communicate information security goals and new programs effectively with other managers.
  • Participates in special projects as assigned.
  • Participates in change management process, assessing security impact of proposed changes.
  • Helps to designs and recommend security policies and procedures.
  • Manages information systems authorizations using eMASS.

Required Qualifications:

  • 10+ years of IT experience experience running security solutions on network/security engineering/security operations, with at least 5+ years Cyber Assurance experience.
  • Knowledge of IT security controls, firewalls, SIEM platforms, NAC, DLP, IPS/IDS, encryption, authentication.
  • Hands on knowledge of best of class cybersecurity tools commonly associated with DOD environments such as: DISA STIG Viewer, Security Content Automation Protocol (SCAP), Trellix Suite, SIEM technologies
  • Hands on experience with Risk Management Framework Assessment and Authorization cybersecurity package management tools such as the Enterprise Mission Assurance Support Service (eMASS) or Telos’ Xacta IA Manager
  • Ability to function in a fast-paced entrepreneurial environment using persuasion, expertise, and judgment to affect change.
  • Must have working knowledge of DOD Risk Management Framework (RMF)
  • Must meet DOD 8750 requirements and be eligible for IAM level II access upon hire for positions with elevated privileges and must obtain ITIL V4 Foundation within six months of hire. Additional specific certifications may be required, depending on job assignment.
  • Must possess and maintain a Top Secret/SCI Security Clearance.
  • BA/BS or the equivalent combination of education, technical training, or work/military experience.
  • Ability to work in a team-oriented, collaborative environment.
  • Ability to work efficiently in a fast-paced environment and multi-task while still ensuring high quality of work
  • Highly organized with strong ability to prioritize work and work autonomously
  • Excellent verbal and written communication skills
  • Great attention to detail and presentation
  • Results driven, highly efficient, energetic and highly motivated
  • Must possess a high degree of intelligence, competence, maturity, adaptability, resilience, integrity and initiative

The work is typically performed at client site locations, which requires proper safety precautions; work may require some physical effort in the handling of light materials, boxes or equipment.

Preferred Qualifications:
CISSP certification preferred.
Information Security Management experience
Knowledge with Virtualization technologies: VMWare, Citrix, and Microsoft
Familiarity of concepts such as DevOps, Infrastructure as Code, Software Defined Data Center, Continuous Deployment, and Continuous Integration desired.
Knowledge with Network level: WAN and LAN connectivity, routers, firewalls, and security internal systems, cloud and network infrastructure
Experience with firewalls and firewall rule sets

Work Requirements
Years of Experience

10 + years of related experience

* may vary based on technical training, certification(s), or degree

Certification

Travel Required

None

Citizenship

U.S. Citizenship Required

Salary and Benefit Information

The likely salary range for this position is $96,034 - $128,800. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
View information about benefits and our total rewards program.

About Our Work

We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across over 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans