Company:
Cyber Defense Technologies
Location: Chantilly
Closing Date: 04/11/2024
Hours: Full Time
Type: Permanent
Job Requirements / Description
Overview : CDT is looking to add an experienced Information Systems Security Officer maintain security operations to various specialized applications. This position will be onsite in Chantilly, VA.
Clearance : An active Top Secret/SCI clearance with CI Poly is required. Candidates who do not meet these clearance requirements will not be considered.
Responsibilities:
Clearance : An active Top Secret/SCI clearance with CI Poly is required. Candidates who do not meet these clearance requirements will not be considered.
Responsibilities:
- Thorough understanding and application of network security principles, practices, and implementations.
- Working knowledge of cross-functional integration of information systems into a physical security environment.
- Working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
- Understanding of system methodologies including but not limited to client server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, LAN, switches, and routers.
- Familiarity with detecting and preventing computer security compromises in a networked environment.
- Working knowledge of configuration management; system maintenance; and integration testing.
- Proficient in the use of tools used to prevent and/or negate malicious code.
- Understanding of COTS tools that scan at the physical layer of all removable and fixed media types including but not limited to: (CDs, hard drives, thumb drives, Zip/Jazz, etc.).
- Ability to decipher and explain in clear language Intelligence Community Directive (ICD) 503.
- Ability to support forensics and evidentiary preservation.
- Ability to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data.
- Demonstrated ability to translate technical information and information technology jargon into plain English.
- Ability to apply a risk management philosophy when faced with security challenges and the ability to articulate the pro's and con's in a clear concise manner.
- Demonstrated proficiency with the following computer operating systems (e.g. Microsoft Windows, LINUX, UNIX, Mac OS, etc.).
- Analytical ability to decipher complex technical configuration management documents.
- Demonstrated proficiency with database maintenance.
- Strong ability to elicit, articulate, and document information in a well-organized manner.
- Demonstrated ability to work independent of close supervision.
- Demonstrated experience with Microsoft Office Suite.
- Working knowledge of all applicable NRO, IC, DoD policies, procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM).
- Excellent communication, interpersonal, and team-building skills to engender rapport with the military personnel, civilians, and other contractors at all levels.
- An ability to prioritize work to meet deadlines, and to manage the workflow of the ISSO team.
- Demonstrated ability to correlate audit results between various systems and/or users and notify the ISSM of any discrepancies.
- Master's Degree and 2 years relevant information assurance or cybersecurity experience, Bachelor's Degree and 3 years relevant information assurance or cybersecurity experience, Associates Degree and 6 years relevant information assurance or cybersecurity experience, High School/GED and 8 years relevant information assurance or cybersecurity experience.
- Mentor, provide guidance and instructional aide to Associate and Junior ISSOs
- Familiarity with conducting research and analysis, network and information system security principles and best practices
- Knowledge of information security program management and project management principles and techniques.
- Knowledge of security violation mitigation measures and incident reporting actions.
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Knowledge of host/network access control mechanisms (e.g., access control list).
- Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data.
Share this job
Cyber Defense Technologies