Sign up for our
weekly
newsletter
of fresh jobs
The Global Freight Management (GFM) system supports the Military Surface Deployment and Distribution Command (SDDC) as the surface transportation component of the United States Transportation Command (USTRANSCOM), which leads the Department of Defense with all of their military transportation requirements. GDIT provides development, maintenance, and sustainment support for the GFM as partners... with the SDDC. GFM is comprised of more than a dozen web-based/cloud-based applications which facilitate the communication between SDDC, shipping businesses, and commercial transport companies in support of the bidding, selection, and coordination of military equipment and personnel requiring transportation anywhere around the world.
To support this requirement, GDIT is seeking a Cyber Security Analyst Senior. A successful candidate can demonstrate the following:
JOB DESCRIPTION:
The position will support a Department of Defense program that is playing a major role in leveraging the commercial transportation industry to support the movement and relocation of DoD personnel, equipment, and supplies. As part of this effort, GDIT has deployed software/database development teams leveraging Agile/Scrum processes to deliver updates through repeated sprint cycles. The position requires the successful candidate to assess and manage ATO and IATT packages to ensure full STIG compliance under RMF processes in cloud-based environments.
HOW A CYBER SECURITY ANALYST SENIOR WILL MAKE AN IMPACT:
• Validating and verifying system security requirements and establishing system security designs for large-scale systems, major system elements, and interfacing systems that are part of a large complex network environment with geographically distributed components.
• Identifying and recommending appropriate information security controls and functionality to ensure uniform application of security policy and enterprise solutions.
• Recommending and developing technical solutions, products, and standards based on current and desired system security architecture.
• Assessing and mitigating system security threats and risks throughout the program life cycle.
• Leading and/or contributing to the security planning, assessment, risk analysis, risk management, certification and awareness activities for various system and networking operations.
• Provide program specific input for the development of new application security documentation and the updating of existing application security documentation to facilitate the security accreditation of the GFM system, and the EDI and SOA environments IAW the current certification and accreditation guidance DODD 8140.01 - will be migrating to NIST Risk Management Framework model).
• Sustain the application and its environment in compliance with the DISA STIGs. The results of the DISA STIG documentation must always reflect the current status of the system; provide monthly updates.
• Provide updates to existing certification and accreditation documentation, such as network diagrams, ports and protocol matrix, application certification package created during release cycle, and other existing documentation. This documentation is required whenever changes are made that may affect the security posture of the application environment.
• Provide a monthly update, no later than the last business day of the month, to the PM for the applications RMF and/or DIACAP Plan of Action and Milestones (POA&M). POA&Ms are maintained within the Enterprise Mission Assurance Support Service (eMASS)
• Effectively collaborating with other internal technical experts on a day-to-day basis.
• Communicating with Program Managers and POCs from customer organizations when necessary regarding security issues of significant importance.
• Participating in program increment planning and related agile team activities.
• Working closely with System Engineering, Test Engineering, and Integration teams to ensure that the hardware and software architecture and implementation meets the security requirements for processing classified information.
• Analyzing and assessing system implementation against multiple security compliance policies and recommending and implementing enhancements.
• Evaluating the impact of new development on the operational security posture of the system.
• Evaluating, reviewing, and testing security-critical software.
• Proposing, assessing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
• Auditing and assessing system security configuration settings using common methodologies and tools.
• Managing and enforcing security strategies and policies that effect various components of the geographically distributed systems.
• Evaluating security solutions to ensure they meet customer specified requirements for processing classified information.
• Providing configuration management for security-relevant information system software.
• Serving as a subject matter expert in security architecture to include providing advice to Program Managers, Customer technical experts, and internal program teams.
• Supporting risk assessment, risk management, security control assessment, continuous monitoring, service design, and other IA program support functions.
• Working with development teams to enrich team-wide understanding of different types of vulnerabilities, attack vectors and remediation approaches.
WHAT YOU WILL NEED TO SUCCEED:
• Bachelor’s degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline and at least 4+ years of relevant experience
• Additional experience may be substituted for a Degree.
• Must have experience applying Risk Management Framework.
• Must have experience formulating and assessing IT security policy.
• Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services.
• Must have experience with secure configurations of commonly used desktop and server operating systems.
• Must be comfortable working on multiple systems and components simultaneously in various configurations.
• Must have strong verbal and written communications skills.
• Must be committed to adopting and adhering to best practices.
• Must be able to effectively plan and prioritize tasking and communicate clearly regarding technical options and trade-offs.
• Must be capable of performing high quality work both independently and with a team in a fast-moving environment.
• DoD 8570 compliance IAT-II certification
PREFERRED REQUIREMENTS:
• Certified Information Systems Security Professional (CISSP) certification
• Experience with DoD RMF processes
• Experience with DoD eMASS systems.
• Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass the development, design, and implementation.
GDIT IS YOUR PLACE:
• 401K with company match
• Comprehensive health and wellness packages
• Internal mobility team dedicated to helping you own your career
• Professional growth opportunities including paid education and certifications
• Cutting-edge technology you can learn from
• Rest and recharge with paid vacation and holidays