Information Security Analyst Senior

General Dynamics Information Technology

Today
Top Secret/SCI
Unspecified
None
IT - Security
Tampa, FL (On-Site/Office)

Responsibilities:

Strategy & Planning
  • Supports enterprise information security standards.
  • Demonstrates ability to perform complex security analysis of classified and unclassified applications, systems, and enclaves for compliance with downward directed and US BICES program centric security requirements.
  • Coordinates with Project Managers (PjM), technologies SMEs (Network, Systems, Cyber Defensive Operations) and other stake holding teams to ensure Cybersecurity dependencies and deliverables are met.
  • Supports all gates (KO, SRR, PDR, CDR, TRR, TAR, OAR and PFR) of projects undergoing the USBICES System Engineering Management Plan (SEMP) .
  • Attends internal, customer facing and vendor meetings to coordinate project activities, status reports or technical exchange engagements with industry partners.
  • Validates and verifies system security requirements definitions, analyzes and establishes system security designs and makes recommendations on solutions to meet security requirements.
  • Collects, organizes and delivers diverse technical information on proposed enterprise solution or changes to satisfy the cybersecurity project requirements.
  • Demonstrates knowledge of Systems and Networks technologies concepts and operations and can relate this knowledge to cybersecurity dependencies and requirements.
  • Critically reviews provided Security Technical Implementation Guides technologies checklist and provides feedback on Vulnerabilities Identifiers (VUL ID) that do not meet enterprise standards or configuration.
  • Responsible for the creation of Security Impact Analysis (SIA) document leveraging provided artifacts and works in concert with the A&A branch to obtain ISSO/M approval.
  • Helps to develop and advise on the implementation of information security standards.
  • Provides tactical and strategic information security advice and examining the ramifications of new technologies.
  • Performs all procedures necessary to ensure the security of information systems assets and to protect systems from intentional or inadvertent access or destruction.
  • Ability to provide an independent assessment and ensure security controls are implemented correctly, operating as intended, and are producing the desired outcome.
  • Maintains current knowledge of relevant technology as assigned.
  • Completes weekly and monthly reporting requirements.

Operational Management
  • May serve as a focal point of contact for the information security team and the customer/organization.
  • Advises on physical security, disaster recovery, and data backup systems.
  • Manages security audits and vulnerability and threat assessments, and directing responses to network or systems intrusions
  • Ensures that all information security systems are functional and secure.
  • Provides training to information security personnel.
  • Assesses current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement.
  • Communicate information security goals and new programs effectively with other managers.
  • Participates in special projects as assigned.
  • Participates in change management process, assessing security impact of proposed changes.
  • Helps to designs and recommend security policies and procedures.
  • Manages information systems authorizations using eMASS.


Required Qualifications:
  • 10+ years of IT experience experience running security solutions on network/security engineering/security operations, with at least 5+ years Cyber Assurance experience.
  • Knowledge of IT security controls, firewalls, SIEM platforms, NAC, DLP, IPS/IDS, encryption, authentication.
  • Hands on knowledge of best of class cybersecurity tools commonly associated with DOD environments such as: DISA STIG Viewer, Security Content Automation Protocol (SCAP), Trellix Suite, SIEM technologies
  • Hands on experience with Risk Management Framework Assessment and Authorization cybersecurity package management tools such as the Enterprise Mission Assurance Support Service (eMASS) or Telos' Xacta IA Manager
  • Ability to function in a fast-paced entrepreneurial environment using persuasion, expertise, and judgment to affect change.
  • Must have working knowledge of DOD Risk Management Framework (RMF)
  • Must meet DOD 8750 requirements and be eligible for IAM level II access upon hire for positions with elevated privileges and must obtain ITIL V4 Foundation within six months of hire. Additional specific certifications may be required, depending on job assignment.
  • Must possess and maintain a Top Secret/SCI Security Clearance.
  • BA/BS or the equivalent combination of education, technical training, or work/military experience.
  • Ability to work in a team-oriented, collaborative environment.
  • Ability to work efficiently in a fast-paced environment and multi-task while still ensuring high quality of work
  • Highly organized with strong ability to prioritize work and work autonomously
  • Excellent verbal and written communication skills
  • Great attention to detail and presentation
  • Results driven, highly efficient, energetic and highly motivated
  • Must possess a high degree of intelligence, competence, maturity, adaptability, resilience, integrity and initiative

The work is typically performed at client site locations, which requires proper safety precautions; work may require some physical effort in the handling of light materials, boxes or equipment.

Preferred Qualifications:
CISSP certification preferred.
Information Security Management experience
Knowledge with Virtualization technologies: VMWare, Citrix, and Microsoft
Familiarity of concepts such as DevOps, Infrastructure as Code, Software Defined Data Center, Continuous Deployment, and Continuous Integration desired.
Knowledge with Network level: WAN and LAN connectivity, routers, firewalls, and security internal systems, cloud and network infrastructure
Experience with firewalls and firewall rule sets

Work Requirements
group id: 90979310

Explore the Art of the Possible | GDIT

Find General Dynamics Information Technology on Social Media
Network Employers (85)
J
Recruiter
M
Recruiter
L
Senior Recruiter
L
Recruiter
C
Talent Acquisition Specialist
About Us
We are GDIT. The people supporting and securing some of the most complex government, defense, and intelligence projects across the country. We ensure today is safe and tomorrow is smarter. Our work has meaning and impact on the world around us, but also on us, and that’s important.

GDIT is your place. You make it your own by embracing autonomy, seizing opportunity, and being trusted to deliver your best every day

GDIT
Opportunity Owned

General Dynamics Information Technology Jobs


Job Category
IT - Security
Clearance Level
Top Secret/SCI