Responsibilities
Responsible for providing key government personnel with policy coordination and interpretation support, general information security support, and assisting with the development and implementation of a defensive security program that protects information systems and documents.
Responsible for ensuring and documenting that all systems are regularly scanned and audited in accordance with applicable DOD policy and procedures, and that incidents are documented and accounted for as necessary through leadership.
Maintains a database to track trends, unauthorized activities, and common practice procedures and remedies to be followed by subordinate units in correcting deficiencies identified during information assurance vulnerability compliance visits.
Employs network scanning tools such as ACAS, and SCCM etc., to detect system and network vulnerabilities/deficiencies as part of a proactive network security policy.
Provides daily status on findings and recommendations and provides follow-on written technical analyses and reports.
Provides 24/7 IAVA reporting, to include review of logs, open tickets, and recommended process for remediation.
Responsible for ensuring the appropriate DoD RMF (Risk Management Framework) process is met and the adequate input of documentation, such as ACAS scans, STIGs, HW/SW List and Network Diagrams are updated monthly into eMass to meet the continuous monitoring requirements.
The work environment will be 95% indoor and 5% outdoor.
Perform other duties as assigned.
Qualifications
Qualifications
Security Clearance:
Requires an active Secret Clearance
Education / Certifications: One-year related experience may be substituted for one year of education if degree is required.
High School diploma required. Two years of college or equivalent experience preferred.
This position requires candidates to adhere to DoD 8570.01M. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification.
The authorized certifications for this job title are listed as follows:
IAT Level: IAT II
BASELINE:
Cisco: CCNA: Certified Network Associate - Security
Cisco: CCNP: Certified Network Professional - Security
CompTIA: CASP+ ce: Advanced Security Practitioner
CompTIA: CySA+ ce: Cybersecurity Analyst (Cannot be used as a dual qualifier)
CompTIA: Security+ ce
GIAC: GCED: Certified Enterprise Defender
GIAC: GCIH: Certified Incident Handler (Cannot be used as a dual qualifier)
GIAC: GICSP: Industrial Cyber Security Professional
GIAC: GSEC: Security Essentials
ISACA: CISA: Certified Information Systems Auditor
ISC2: CISSP (or Associate): Certified Information Systems Security Professional
ISC2: SSCP: Systems Security Certified Practitioner
COMPUTING ENVIRONMENT (CE):
CompTIA: Server+
CompTIA: CySA+ ce: Cybersecurity Analyst (Cannot be used as a dual qualifier)
DISA: ACAS: Assured Compliance Assessment Solution 5.3
EC Council: ESCA: Certified Security Analyst
GIAC: GCED: Certified Enterprise Defender: Certified Enterprise Defender
GIAC: GCFA: Certified Forensic Analyst: Certified Forensic Analyst
GIAC: GCFE: Certified Forensics Examiner
GIAC: GCFW: Certified Firewall Analyst
GIAC: GCIA: Certified Intrusion Analyst
GIAC: GCIH: Certified Incident Handler (Cannot be used as a dual qualifier)
GIAC: GCWN: Certified Windows Security Administrator
GIAC: GNFA: Network forensic Analyst
GIAC: GPEN: Certified Penetration Tester
GIAC: GPPA: Certified Perimeter Protection Analyst
GIAC: GREM: Reverse Engineering Malware