Job ID: 1923776
Location: , United States
Date Posted: Dec 2, 2019
Subcategory: Cyber Sec Analyst
Shift: Day Job
Travel: Yes, 10 % of the Time
Minimum Clearance Required: Top Secret
Clearance Level Must Be Able to Obtain: Top Secret
Potential for Teleworking: Yes
SAIC is seeking candidates for the Defense Information Systems Agency (DISA), a Combat Support Agency, who engineers and provides command and control capabilities and enterprise infrastructure, to continuously operate and assure a global net-centric enterprise which directly supports joint warfighters, national level leaders, and other mission and coalition partners across the full spectrum of operations.
The SAIC team will help provide software development support and expertise for the unclassified and classified portals DISA Store Front (DSF) in NIPRNet and SIPRNet hosted environments. This includes providing support and expertise for: DISA Service Catalog, order entry and management capabilities for DISA services, process workflow automation, SDE automation, System Integrations, transactions occurring between systems, notifications, and reporting capabilities. DSF employs an Agile development methodology and will use JIRA to support their efforts.
The candidate for this position develops technical solutions to complex problems which require the regular use of ingenuity and creativity, exercises considerable latitude in determining technical objectives of assignment, exercises judgment in selecting methods, techniques and evaluation criteria for obtaining results, applies extensive technical expertise and has full knowledge of other related disciplines, provides guidance to subordinates to achieve goals in accordance with established policies, and establishes and recommends changes to policies which affect subordinate organization(s).
Provides the leadership, management, and supervisory IA skills identified in DoD Directive 8570.01-M. These skills and their associated duties may include the following:
Ensures the rigorous application of IA policies, principles, and practices in the delivery of all information technology (IT) and IA services.
Leads and directs team personnel too quickly, efficiently and effectively to solve complex IA problems.
Identifies IA requirements as part of the IT acquisition development process and assists in the formulation of IA /IT budgets.
Plans, integrates, and schedules the installation of new or modified hardware, operating systems, and software applications.
Supervises the assessment and implementation of identified computer and network environment fixes such as system patches and fixes associated with specific technical vulnerabilities as part of the Information Assurance Vulnerability Management program.
Guides the implementation of appropriate operational structures and processes to ensure an effective IA security program including boundary defense, incident detection and response.
Evaluates functional operation and performance in light of test results and make recommendations regarding C&A.
Monitors and evaluates the effectiveness of IA security procedures and safeguards.
Evaluates security violations to determine necessary initial and long term corrective action.
Assesses impact, determines probably damage and suggest methods of damage control, conducts computer forensics, and follow-on analysis to build historical and predictive capabilities for IA incidents.
Develops IA related customer support policies, procedures, and standards.
Designs perimeter defense systems including intrusion detection systems, firewalls, grid sensors, etc., enhances rule sets to detect or block sources of malicious traffic, and establishes a protective net of layered defenses to prevent, detect, and eradicate threats.
Ensures that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with DoD Component level IA architecture.
Has a working knowledge of policy, guidance and evaluation criteria of the DoD Critical Infrastructure Program.
Prepares and/or oversees the preparation of IA certification and accreditation documentation.
Assists in the gathering and preservation of evidence used in the prosecution of computer crimes.
Identifies the IT security program implications of new technologies or technology upgrades.
Conducts IA cost benefit, economic and risk analysis in the IT acquisition decision making process.
Interprets security requirements relative to the capabilities of new information technologies.
Interprets patterns of non-compliance to determine their impacts on levels of risk and/or overall effectiveness of IA programs.
Analyzes identified security strategies and recommends the best approaches and/or practices.
Monitors and evaluates the effectiveness of IA security procedures and safeguards to ensure they provide the intended level of protection.
Bachelors and ten (10) years or more experience; Masters and seven (7) years or more experience; PhD or JD and four (4) years of more experience
Familiarity with Agile and or SAFe practices. Experience with JIRA. Any equivalent IAT-III certification; if not the certification listed above.
SAIC is a premier technology integrator, solving our nation's most complex modernization and systems engineering challenges across the defense, space, federal civilian, and intelligence markets. Our robust portfolio of offerings includes high-end solutions in systems engineering and integration; enterprise IT, including cloud services; cyber; software; advanced analytics and simulation; and training. We are a team of 23,000 strong driven by mission, united purpose, and inspired by opportunity. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $6.5 billion. For more information, visit saic.com. For information on the benefits SAIC offers, see Working at SAIC. EOE AA M/F/Vet/Disability