empty

Information Security Analyst

InterImage

Job Description

Posted on: 
November 25, 2024

Summary and company overview

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Ensures the rigorous application of cybersecurity policies, principles, and practices in the delivery of all Information Technology (IT) and cybersecurity services. Develops and designs security solutions to maintain confidentiality, integrity, and availability of information throughout the enterprise. Identifies, plans, and documents improvements to security controls. Develops and documents recommendations and courses of action (COAs) to solve complex cybersecurity problems. Develops and interprets cybersecurity requirements and assists in the formulation of cybersecurity/IT budgets. Plans and schedules the installation of new or modified security hardware, operating systems, and software applications. Ensures the assessment and implementation of identified computer and network environment fixes as part of the Cybersecurity Vulnerability Management program. Guides the implementation of appropriate operational structures and processes to ensure an effective cybersecurity program.

Responsibilities

  • Maintaining the appropriate operational security posture for an information system
  • Manage the security of the information system through Certification & Accreditation (C&A)
  • Support the information system owner for the completion of security-related responsibilities.
  • Review System Security Plans (SSP) and solutions
  • Recommend security mechanism implementations
  • Evaluate and document the effectiveness of solutions implemented to provide the "CIA Triad"

Job Requirements

Required Qualifications:

  • Minimum 5 (five) years of experience with cybersecurity or information assurance
  • Minimum of Bachelor’s Degree in a technical or business discipline from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related discipline
  • One of the following security certifications (active status): CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO - (minimum DoD 8570 IAM Level II Certification)
  • Must know Risk Management Framework (RMF)
  • Active TS/SCI + Polygraph

Preferred Qualifications:

  • Experience with DoD Cybersecurity Policies
  • Experience with Xacta Solutions (Xacta 360)
  • Knowledge of Enterprise Mission Assurance Support Service (eMASS)
  • Experience with Zero Trust
  • Exposure to AWS (Amazon Web Services), ACAS (Security scanning software), vCenter, WSUS (Windows Server Update Service), and/or STIGs/IAVA
  • A problem solver who can get in, be given a project, and use engineering skills to determine a solution
  • Able to build systems from the ground up – network architecture/systems engineering

Additional commentary

  • Location: Fort Meade/Columbia, MD (Customer Site - CANX)

  • InterImage Benefit Snapshot:

  • 401K: up to 3% discretionary profit sharing contribution + 100% match on the 1st 7% of pay

  • PTO: 20 days per year

  • Healthcare, dental, vision, Free for a single participant

  • $50,000 Life insurance provided, additional voluntary life insurance available

  • #CJ

  • Clearance Level: TS/SCI CI

  • Job Location: Columbia, MD

  • Salary Range: 131000

  • Salary Disclaimer: Additional compensation can be discussed and negotiated with the candidate, to determine the experience and skills the candidate possesses as defined by the position requirements.

Summary and company overview

Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Ensures the rigorous application of cybersecurity policies, principles, and practices in the delivery of all Information Technology (IT) and cybersecurity services. Develops and designs security solutions to maintain confidentiality, integrity, and availability of information throughout the enterprise. Identifies, plans, and documents improvements to security controls. Develops and documents recommendations and courses of action (COAs) to solve complex cybersecurity problems. Develops and interprets cybersecurity requirements and assists in the formulation of cybersecurity/IT budgets. Plans and schedules the installation of new or modified security hardware, operating systems, and software applications. Ensures the assessment and implementation of identified computer and network environment fixes as part of the Cybersecurity Vulnerability Management program. Guides the implementation of appropriate operational structures and processes to ensure an effective cybersecurity program.

Apply now