JCS Solutions LLC
Information Assurance Analyst
JCS Solutions LLC, Fort George Meade, Maryland, United States,
JCS Solutions LLC (JCS) is a premier technology firm specializing in enterprise-wide capabilities including cloud and infrastructure solutions, cyber security, digital modernization, next generation technologies enablement, software solutions, and mission support services dedicated to providing the highest quality of services and solutions. JCS delivers expert management consulting and information technology (IT) solutions to federal agencies.
We are a learning organization that promotes a work culture of collaboration, inclusiveness, inspiration and innovation.
JCS has been certified as a Great Place to Work four years in a row and was awarded as Washington Post's Top Places to Work for 2024.
Our employees embody our core values, and we are looking for others who do too!
Customer Experience:
Strive for excellence and delight our clientsInnovation:
Embrace creative thinking to enable continual growth and powerful solutionsAccountability:
Take ownership of and pride in our actions and service deliveryInspire:
Be inspired to be your best self and have fun in the processIntegrity:
Do the right thing, the right way, every time!Summary:
JCS Solutions has a need for an
Information Assurance (IA) Analyst
to join our growing Defense Enclave Services (DES) team at Ft. Meade, MD. The DES program is a highly demanding mission and requires expert technical and professional management to support DISA's enterprise Information Technology (IT) services. You will be supporting a large and complex IT discovery, design, and migration effort towards a Single Service Provider model for the Department of Defense. This role will include discovery, analysis, and design activities required to migrate common IT services from multiple large-scale DoD agencies into DoDNet. This position offers an excellent opportunity to be part of a high-performing team responsible for supporting a high-velocity collaborative environment, along with tremendous growth potential. If you are interested in a challenge and a great working environment, apply today!
What you will do:
The specific duties include but are not necessarily limited to the following:
Perform (or review) technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies.Ensure that the environments in which DoD information systems reside are secure and compliant, develop approaches to secure the environment, assess threats to the environment, provide inputs on the adequacy of security designs and architectures, perform RMF related activities, and participate in risk assessment during the certification and accreditation process.Evaluate, develop and/or implement information assurance guidelines and procedures as required.Recommend security solution mitigations and enhancements supporting information assurance guidelines and customer requirements.Perform vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.Conduct IT security site surveys.Support Authorizing Official (AO) actions by developing and delivering accreditation packages with supporting documents and artifacts in accordance with RMF as defined in NIST 800-37 revision 2 and related agency specific RMF requirements.Provide input into an Audit and Accountability Plan containing methods, procedures, and planned reviews for the continuing accreditation and authorization against AU (Audit and Accountability) family controls per NIST SP 800-53 guidance.Provide input and implements an organizational access control policy and plan in compliance with risk-levels defined in the National Institute of Standards and Technology (NIST) 800-53, rev 4, Access Control family of controls to include auditing annually, at a minimum.Develop processes and procedures for evaluating and documenting information system security vulnerabilities IAW DoD Instruction (DoDI) 8510.01 (RMF for DoD IT)Ensure that all information systems meet or exceed compliance requirements.Identify, report, and resolve security violations.Establish and satisfy information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.Have experience performing various types of vulnerability and assessment scans with multiple tools.Perform various types of vulnerability and assessment scans with multiple tools.Experience using eMASS and/or Xacta.Mentor team members.Monitor and review the regular updates/upgrades to equipment and procedures to maintain pace with IA requirements and business needs.Identify overall security requirements for the proper handling of Government data.Excellent communication and collaboration skills are a must.To be successful, you should have:
Experience collaborating with diverse stakeholders to drive consensus and forward progressAbility to identify needed changes to processes and activities and help to implement continuous improvement solutionsCertified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and/or Certified Accreditation Professional (CAP)Ability to work successfully as part of a virtual teamRequired Skills and Experience:
Must hold an active Secret security clearance. (US Citizenship required per government contract)A Bachelor's degree and 8+ years of network engineering experience; additional years of experience may be substituted in lieu of a degree.Prior relevant experience working with RMF, serving in an ISSO, ISSO support, SCA representative, or similar role.Current DoD 8570 IAT II Certification is required. (Sec+.)Have experience performing various types of vulnerability and assessment scans with multiple tools.Have experience using eMASS and/or Xacta.Solid understanding of the Risk Management Framework (RMF) and the System Development Life Cycle (SDLC).Understanding of hardware and software engineering best practices.Demonstrated analytical and problem-solving skills.Must meet eligibility requirements for work assignment on specified contract.Applicants selected will be subject to a government security investigation and must meet eligibility requirements.It is JCS' policy to promote equal employment opportunities and celebrate diversity. All qualified applicants will receive consideration for employment without regard to sex, race, color, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.
We are a learning organization that promotes a work culture of collaboration, inclusiveness, inspiration and innovation.
JCS has been certified as a Great Place to Work four years in a row and was awarded as Washington Post's Top Places to Work for 2024.
Our employees embody our core values, and we are looking for others who do too!
Customer Experience:
Strive for excellence and delight our clientsInnovation:
Embrace creative thinking to enable continual growth and powerful solutionsAccountability:
Take ownership of and pride in our actions and service deliveryInspire:
Be inspired to be your best self and have fun in the processIntegrity:
Do the right thing, the right way, every time!Summary:
JCS Solutions has a need for an
Information Assurance (IA) Analyst
to join our growing Defense Enclave Services (DES) team at Ft. Meade, MD. The DES program is a highly demanding mission and requires expert technical and professional management to support DISA's enterprise Information Technology (IT) services. You will be supporting a large and complex IT discovery, design, and migration effort towards a Single Service Provider model for the Department of Defense. This role will include discovery, analysis, and design activities required to migrate common IT services from multiple large-scale DoD agencies into DoDNet. This position offers an excellent opportunity to be part of a high-performing team responsible for supporting a high-velocity collaborative environment, along with tremendous growth potential. If you are interested in a challenge and a great working environment, apply today!
What you will do:
The specific duties include but are not necessarily limited to the following:
Perform (or review) technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies.Ensure that the environments in which DoD information systems reside are secure and compliant, develop approaches to secure the environment, assess threats to the environment, provide inputs on the adequacy of security designs and architectures, perform RMF related activities, and participate in risk assessment during the certification and accreditation process.Evaluate, develop and/or implement information assurance guidelines and procedures as required.Recommend security solution mitigations and enhancements supporting information assurance guidelines and customer requirements.Perform vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.Conduct IT security site surveys.Support Authorizing Official (AO) actions by developing and delivering accreditation packages with supporting documents and artifacts in accordance with RMF as defined in NIST 800-37 revision 2 and related agency specific RMF requirements.Provide input into an Audit and Accountability Plan containing methods, procedures, and planned reviews for the continuing accreditation and authorization against AU (Audit and Accountability) family controls per NIST SP 800-53 guidance.Provide input and implements an organizational access control policy and plan in compliance with risk-levels defined in the National Institute of Standards and Technology (NIST) 800-53, rev 4, Access Control family of controls to include auditing annually, at a minimum.Develop processes and procedures for evaluating and documenting information system security vulnerabilities IAW DoD Instruction (DoDI) 8510.01 (RMF for DoD IT)Ensure that all information systems meet or exceed compliance requirements.Identify, report, and resolve security violations.Establish and satisfy information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.Have experience performing various types of vulnerability and assessment scans with multiple tools.Perform various types of vulnerability and assessment scans with multiple tools.Experience using eMASS and/or Xacta.Mentor team members.Monitor and review the regular updates/upgrades to equipment and procedures to maintain pace with IA requirements and business needs.Identify overall security requirements for the proper handling of Government data.Excellent communication and collaboration skills are a must.To be successful, you should have:
Experience collaborating with diverse stakeholders to drive consensus and forward progressAbility to identify needed changes to processes and activities and help to implement continuous improvement solutionsCertified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), and/or Certified Accreditation Professional (CAP)Ability to work successfully as part of a virtual teamRequired Skills and Experience:
Must hold an active Secret security clearance. (US Citizenship required per government contract)A Bachelor's degree and 8+ years of network engineering experience; additional years of experience may be substituted in lieu of a degree.Prior relevant experience working with RMF, serving in an ISSO, ISSO support, SCA representative, or similar role.Current DoD 8570 IAT II Certification is required. (Sec+.)Have experience performing various types of vulnerability and assessment scans with multiple tools.Have experience using eMASS and/or Xacta.Solid understanding of the Risk Management Framework (RMF) and the System Development Life Cycle (SDLC).Understanding of hardware and software engineering best practices.Demonstrated analytical and problem-solving skills.Must meet eligibility requirements for work assignment on specified contract.Applicants selected will be subject to a government security investigation and must meet eligibility requirements.It is JCS' policy to promote equal employment opportunities and celebrate diversity. All qualified applicants will receive consideration for employment without regard to sex, race, color, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.