Full-time
SME Information Security Analyst - Salient CRGT, Inc - Washington, DC

Job Description: Are you looking for a new and exciting career opportunity? Join our award-winning organization and work with some of the most talented minds within our Enterprise Technology and Innovation teams. As a Salient CRGT employee, you get to be part of a best performing team supporting our nation’s most critical missions.
Why Salient CRGT? We’re passionate about the inspirational missions of our customers and we entrust our employees and teams to deliver exceptional performance to enable the safety, security, health and well-being of our nation. We provide the tools and resources to help you be successful, and our culture fosters an environment in which idea sharing and collaboration is essential. Are you ready to make a difference?
The ideal candidate will be responsible for Provides technical/management leadership on major tasks or technology assignments. Establishes goals and plans that meet project objectives. Has domain and expert technical knowledge. Directs and controls activities for a client, having overall responsibility for financial management, methods, and staffing to ensure that technical requirements are met. Interactions involve client negotiations and interfacing with senior management. Decision-making and domain knowledge may have a critical impact on overall project implementation. May supervise others. OVERALL JOB DESCRIPTION: Ensures the security posture of information systems architecture in accordance with DoD/IC Security and Information Assurance standards and policies. JOB FAMILY DESCRIPTION: Designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management). Assesses and mitigates system security threats and risks throughout the program life cycle. Validates system security requirements definition and analysis. Establishes system security designs. Implements security designs in hardware, software, data, and procedures. Verifies security requirements; performs system certification and accreditation planning and testing and liaison activities. Supports secure systems operations and maintenance. KEY DUTIES AND RESPONSIBILITIES: IAT Level 3 Certified Participates with the client in the strategic design process to translate security and business requirements into technical designs. Configures and validates secure systems and tests security products and systems to detect security weakness; performs network scanning and vulnerability analysis. Ensures that the appropriate security features and safeguards have been implemented on all information systems as required by DoD/IC policy and directives, and industry best practices. Performs defense device system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of all implemented, maintained, and deployed systems. Provides security certification test and evaluation of assets, vulnerability management and response, security assessments, customer support and provides guidance on security issues. Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. COMPETNCY: Senior Specialist/SME KNOWLEDGE: Expert knowledge in specialized functions. Exhaustive understanding of, both general and specific aspects of the job and its application. PROBLEM SOLVING: Works on unusually complex technical problems and provide solutions which are highly innovative and ingenious. SUPERVISION: Work is unsupervised and assignments are often self-initiated. Work checked through consultation and agreement with client rather than by formal review of superior. May supervise others. IMPACT: Develops advanced technological ideas and guides their development into a final product. Erroneous decisions or recommendations would typically result in failure to achieve critical organizational objectives and affect the image of the Company's technological capability. EDUCATION/EXPERIENCE: Bachelor's in computer systems analysis, computer science, computer information systems (CIS), management information systems (MIS), business intelligence or a similar field of study (or commensurate experience). 12+ years’ experience PHYSICAL REQUIREMENTS: Sits up to 6 hours per day using close vision, repetitive wrist, hand or finger movement (to operate computer equipment), lifts up to 25 pounds.
#cjpost #super6 #muncyreqs #crgt456 #jpreqs Required Qualifications: IAT Level 3 Certified
U.S. citizenship required
EDUCATION/EXPERIENCE: Bachelor's in computer systems analysis, computer science, computer information systems (CIS), management information systems (MIS), business intelligence or a similar field of study (or commensurate experience). 12+ years’ experience
1. Participates with the client in the strategic design process to translate security and business requirements into technical designs.
2. Configures and validates secure systems and tests security products and systems to detect security weakness; performs network scanning and vulnerability analysis.
3. Ensures that the appropriate security features and safeguards have been implemented on all information systems as required by DoD/IC policy and directives, and industry best practices.
4. Performs defense device system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of all implemented, maintained, and deployed systems.
5. Provides security certification test and evaluation of assets, vulnerability management and response, security assessments, customer support and provides guidance on security issues. Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. Desired Qualifications: DESIRED SKILLS: Certified Ethical Hacker (CEH) Cisco Certified Network Professional Security (CCNP Security) Certified Information Systems Security Professional (CISSP) (CCIE) Cisco Certified Internetworking Expert (Security) - Strongly desired Experience installing firewalls, data encryption software, and anti-virus protections. Experience conducting security compliance audits
Salient CRGT is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, age, sex, sexual orientation, gender identity or expression, veteran status, disability, genetic information, or any other factor prohibited by applicable anti-discrimination laws.

Expired, click here to search for relevant jobs

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.