Security Control Assessor II (SCA II) - Secret - Crystal City, VA

Job Description
Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
1. Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.
2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
3. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
4. Evaluate firewall change requests and assess organizational risk.
5. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
6. Assists with implementation of counter-measures or mitigating controls.
7. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
8. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
9. Prepares incident reports of analysis methodology and results.
10. Provides guidance and work leadership to less-experienced technical staff members, and may have supervisory responsibilities.
11. May serve as a technical team or task leader.
12. Maintains current knowledge of relevant technology as assigned.
13. Participates in special projects as required.
Education
Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.
Contract Specific Requirements:
Education
Bachelors degree in a related discipline or four (4) years equivalent experience
7-9 years related experience (9 years minimum, if no degree)
Minimum of four (4) years of experience in Special Access Programs and/or SCI Security and the implementation of regulations identified in the description of duties
Certifications
Must possess Information Assurance Technician/Information Assurance Manager (IAT/IAM) Level II at date of hire and
must possess IAT/IAM Level III within 6 months of date of hire.
Qualifications
8-10 years of related experience in data security administration.
Contract Specific Requirements:
DoD Top Secret or DoD Secret Security Clearance and
eligibility for access to Special Access Program (SAP) Information and/or eligibility for Special Compartmented Information (SCI),
willingness to submit to a Counterintelligence (CI) polygraph and have a Periodic Reinvestigation no older than five (5) years.
Experience with Information Assurance (IA) vulnerability scanning software tools, implementing Security Technical Implementation Guides (STIGS), and applying IA Vulnerability Assessment (IAVA) patches
Experience creating and maintaining various security documents such as the Security Control Plan/Vulnerability Security Review (SCP/VSR), System Backup and Recovery Plans (SBRP) and Plan of Action and Milestone (POA&M) tables
As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.
GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities.
Options

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Security Control Assessor II w/Active TS/SCI
Chantilly, VA General Dynamics Information Technology
Security Control Assessor - Sr. Level
Chantilly, VA Leidos
Security Control Assessor III w/ Active TS/SCI
Chantilly, VA General Dynamics Information Technology
Security Control Assessor - Senior
Reston, VA Invictus International Consulting, LLC
Cyber Security Controls Assessor, Sr Principal
Springfield, VA CACI International