Information System Security Analyst

The Information System Security Analyst applies current technologies to the design, development, evaluation and integration of computer information systems and networks to maintain system security. May work with commercial computer product vendors in the design and evaluation of state-of-the-art secure COTS applications, operating systems, networks and database products and technology. Provides security engineering and integration services to internal customers. Involved in a wide range of issues including secure architectures, secure electronic data traffic, network security, information security and privacy. Uses encryption technology, penetration, risk management and vulnerability analysis of various security technologies and information technology security research. Develops security systems for any manual or automated systems environments. Responsible for ensuring the protection of company data against unauthorized disclosure, accidental or intentional loss of data, or unauthorized modification. May prepare security reports.
Required skills include:
Maintain operational security posture for the program to ensure information systems security policies, standards, and procedures are established and followed.
Assist with the management of security aspects of the information system and performs day-to-day security operations of the system.
Evaluate security solutions to ensure they meet security requirements for processing classified information.
Perform vulnerability/risk assessment analysis to support certification and accreditation.
Provides configuration management (CM) for information system security software, hardware, and firmware.
Manage changes to system and assesses the security impact of those changes.
Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, etc.
Experience and/or familiarity with Certification and Accreditation (C&A).
Experience and/or familiarity with the following network protection devices: Firewalls, intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis
Experience and/or familiarity with Secure Technical Implementation Guides (STIGs), Information Assurance Vulnerability Alert (IAVA), DCID 6/3, Federal Information Security Management Act (FISMA) and other tools using industry best practices.
DoD 8570.1-M Compliance at IAT Level I or equivalency (e.g., Certified Information Systems Security Professional (CISSP)) certification required
Desired skills include:
Experience or familiarity with Agile development methodology.
Bachelor's degree in Information Security, Cyber Engineering or related.
Active Top Secret/Sensitive Compartmented Information (TS/SCI) security clearance required.
U.S. Citizenship required.
Equal Opportunity Employer/M/F/Disability/Vet/Sexual Orientation/Gender Identity

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Senior Cloud Information System Security Analyst
Fairfax, VA CGI Group Inc.
Information Systems Security Analyst (Informat...
Arlington, VA AAJV (APS-ARTI Joint Venture, LLC)
Sr. Information System Security Analyst
Norfolk, VA Honeywell
Information Systems Security Analyst, Senior
McLean, VA Booz Allen Hamilton
Jr. Cloud Information Systems Security Analyst
Fairfax, VA CGI Group Inc.