Cyber Systems Analyst / Security Specialist Information Technology (IT) - Arlington, VA at Geebo

Cyber Systems Analyst / Security Specialist

ECS is seeking a Cyber Systems Analyst / Security Specialist to work in our Arlington, VA and Washington, DC office.
Please Note:
This position is contingent upon additional funding.
Job Description:
Provides day-to-day project management for IT/Cyber program development and developmental IT networks.
Includes interacting with appropriate intelligence communities (IC) and agencies, analyzing / assessing applicability of proposed test networks to meet program requirements, as well as, processing all actions relating to NISPOM, ICDS, DoD 5205 series of manuals, etc.
Coordinates with / provides direct support to the Program/Deputy Program Manager in the daily execution of their responsibilities.
All duties are conducted at the customer site in a classified facility.
Periodically travels to support program reviews / demonstrations.
Required Skills:
Must have current TS/SCI clearance and SSBI PR.
.
Ability to establish, maintain, and partner with various intelligence communities (IC) and other partners to address program requirements.
Develop/formalize intelligence requirements associated with program objectives; review/summarize existing intelligence and analytical products; and coordinate with IC to ensure accurate representation of test networks and systems used for program technology evaluation.
Experience supporting / facilitating Risk Management Framework standards for IT programs and developer networks.
Support all aspects of SAP (and SCI) related efforts including security management, personnel security, physical security, COMSEC, automated information systems security, etc.
Expertise processing actions and documentation related to NISPOM, ICDS, DoD 5205 series of manuals, Executive Orders, DoD Instructions, and operational security (OPSEC).
Ability to manage, coordinate, schedule, and oversee office staff and program actions on behalf of program and deputy program managers.
Interact / coordinate with various external agencies, military services, and operational commands to schedule program updates, demonstrations, and technology transfer.
Prepare, staff and track MOUs, MOAs, Acquisition Plans, and various reports.
Technical Degree (Computer engineering/science/networking, Information Technology, Electrical, Physics, etc.
) Experience working with classified programs in classified spaces.
Desired Skills:
Experience supporting R&D programs; ability to support requirement developments, SOW preparation, source selection evaluation, and other acquisition program management responsibilities.
Program test and evaluation:
planning, coordination, execution, and data analysis.
ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis of race, color, religion, gender, age, national origin, citizenship, disability, veteran status or any other classification protected by federal, state, or local law.
ECS promotes affirmative action for minorities, women, disabled persons, and veterans.
ECS is a leading mid-sized provider of technology services to the United States Federal Government.
We are focused on people, values and purpose.
Every day, our 3800
employees focus on providing their technical talent to support the Federal Agencies and Departments of the US Government to serve, protect and defend the American People.
General Description of Benefits Recommended Skills Automated Information System (Ais) Computer Engineering Coordinating Data Analysis Information Technology Networking Apply to this job.
Think you're the perfect candidate? Apply on company site Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.