In support of a DISA prototyping effort, the Intel and Cyber Division is assembling a team of network engineers, systems engineers, Unified Communications Engineers, and Integration Engineers, change management specialists, information assurance professionals, and procurement personnel knowledgeable in SCRM processes to support a program that provides critical network capabilities to the Department of Defense. We are committed to recruiting and retaining this team for prototype development, test, and demonstration, as well as making this team available longer term for integration, deployment and sustainment as needed.
Candidates interested in joining the team must be critical thinkers, have a strong work ethic, and be able to work independently or as a member of a team in a dynamic environment that supports a critical and rewarding mission. We value candidates who are detail-oriented while also being able to think and react quickly to emerging and unique problem sets. To be successful, you must be able to rapidly adapt and learn how to operate the front and back end of new products and processes.
This position is contingent upon contract award
Responsibilities\:
The duties and responsibilities of the Information Systems Security Officer include, but are not limited to, the following\:
#divergent
*In support of a DISA prototyping effort, the Intel and Cyber Division is assembling a team of network engineers, systems engineers, Unified Communications Engineers, and Integration Engineers, change management specialists, information assurance professionals, and procurement personnel knowledgeable in SCRM processes to support a program that provides critical network capabilities to the Department of Defense. We are committed to recruiting and retaining this team for prototype development, test, and demonstration, as well as making this team available longer term for integration, deployment and sustainment as needed.
Candidates interested in joining the team must be critical thinkers, have a strong work ethic, and be able to work independently or as a member of a team in a dynamic environment that supports a critical and rewarding mission. We value candidates who are detail-oriented while also being able to think and react quickly to emerging and unique problem sets. To be successful, you must be able to rapidly adapt and learn how to operate the front and back end of new products and processes.
This position is contingent upon contract award
Responsibilities\:
The duties and responsibilities of the Information Systems Security Officer include, but are not limited to, the following\:
#divergent
* Must meet DoD 8570.01-M IAT-II or IAM-I baseline certification requirements such as Security or equivalent. Experience with Microsoft Office applications such as Excel, Word, and Outlook. Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the Risk Management Framework. Experience with security configurations across multiple operating systems in various environments, to include Windows, Linux, UNIX, utilizing Active Directory/Group Policy. In-depth knowledge of Microsoft Windows OS (client and server); familiarity with Red Hat Enterprise Linux (RHEL) desired. Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the Risk Management Framework. Experience with eMASS, XACTA, ACAS/NESSUS, Trellix, and Splunk. Experience with risk managed downloads, IS sanitization and destruction, contaminations, incident response, virus scanning, privileged user access, and hardware/software configuration management. Experience with developing IT policy, guidance, or procedure documentation supporting cybersecurity accreditations. Experience with analyzing, assessing, or implementing NIST SP 800-53 security controls, CCIs, and associated assessment procedures. Experience with developing and presenting complex technical information for technical and non-technical audiences. Expert familiarity with RMF. Experience with Microsoft Office applications such as Excel, Word, Outlook, and SharePoint. Exceptional attention to detail; excellent verbal and written communication skills; strong organizational skills; critical thinking and problem-solving skills. Ability to work both independently and as part of a team in a dynamic environment. Ability to travel up to 25%.Clearance Required\:
Must have active Top Secret clearance with SCI or TS with the ability to acquire SCIMinimum Education\:
High School DiplomaMinimum Years of Experience\:
8 years of related experiencePreferred\:
Bachelor's degree in cybersecurity or related field Previous supervision and/or participation with cybersecurity Assessment and Authorizations. Ability to provide hands-on cyber security tool assistance as necessary. Familiarity with cybersecurity tool suite; ForeScout, Avanti, and HBSS. * Must meet DoD 8570.01-M IAT-II or IAM-I baseline certification requirements such as Security or equivalent. Experience with Microsoft Office applications such as Excel, Word, and Outlook. Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the Risk Management Framework. Experience with security configurations across multiple operating systems in various environments, to include Windows, Linux, UNIX, utilizing Active Directory/Group Policy. In-depth knowledge of Microsoft Windows OS (client and server); familiarity with Red Hat Enterprise Linux (RHEL) desired. Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the Risk Management Framework. Experience with eMASS, XACTA, ACAS/NESSUS, Trellix, and Splunk. Experience with risk managed downloads, IS sanitization and destruction, contaminations, incident response, virus scanning, privileged user access, and hardware/software configuration management. Experience with developing IT policy, guidance, or procedure documentation supporting cybersecurity accreditations. Experience with analyzing, assessing, or implementing NIST SP 800-53 security controls, CCIs, and associated assessment procedures. Experience with developing and presenting complex technical information for technical and non-technical audiences. Expert familiarity with RMF. Experience with Microsoft Office applications such as Excel, Word, Outlook, and SharePoint. Exceptional attention to detail; excellent verbal and written communication skills; strong organizational skills; critical thinking and problem-solving skills. Ability to work both independently and as part of a team in a dynamic environment. Ability to travel up to 25%.Clearance Required\:
Must have active Top Secret clearance with SCI or TS with the ability to acquire SCIMinimum Education\:
High School DiplomaMinimum Years of Experience\:
8 years of related experiencePreferred\:
Bachelor's degree in cybersecurity or related field Previous supervision and/or participation with cybersecurity Assessment and Authorizations. Ability to provide hands-on cyber security tool assistance as necessary. Familiarity with cybersecurity tool suite; ForeScout, Avanti, and HBSS. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.