Cyber Defense Technologies
Information System Security Officer
Cyber Defense Technologies, Chantilly, Virginia, United States, 22021
Overview
: CDT is looking to add an experienced Information Systems Security Officer maintain security operations to various specialized applications. This position will be onsite in Chantilly, VA.
Clearance
: An active Top Secret/SCI clearance with CI Poly is required. Candidates who do not meet these clearance requirements will not be considered.
Responsibilities:
Thorough understanding and application of network security principles, practices, and implementations.
Working knowledge of cross-functional integration of information systems into a physical security environment.
Working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
Understanding of system methodologies including but not limited to client server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, LAN, switches, and routers.
Familiarity with detecting and preventing computer security compromises in a networked environment.
Working knowledge of configuration management; system maintenance; and integration testing.
Proficient in the use of tools used to prevent and/or negate malicious code.
Understanding of COTS tools that scan at the physical layer of all removable and fixed media types including but not limited to: (CDs, hard drives, thumb drives, Zip/Jazz, etc.).
Ability to decipher and explain in clear language Intelligence Community Directive (ICD) 503.
Ability to support forensics and evidentiary preservation.
Ability to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data.
Demonstrated ability to translate technical information and information technology jargon into plain English.
Ability to apply a risk management philosophy when faced with security challenges and the ability to articulate the pro’s and con’s in a clear concise manner.
Demonstrated proficiency with the following computer operating systems (e.g. Microsoft Windows, LINUX, UNIX, Mac OS, etc.).
Analytical ability to decipher complex technical configuration management documents.
Demonstrated proficiency with database maintenance.
Strong ability to elicit, articulate, and document information in a well-organized manner.
Demonstrated ability to work independent of close supervision.
Demonstrated experience with Microsoft Office Suite.
Working knowledge of all applicable NRO, IC, DoD policies, procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM).
Excellent communication, interpersonal, and team-building skills to engender rapport with the military personnel, civilians, and other contractors at all levels.
An ability to prioritize work to meet deadlines, and to manage the workflow of the ISSO team.
Demonstrated ability to correlate audit results between various systems and/or users and notify the ISSM of any discrepancies.
Master’s Degree and 2 years relevant information assurance or cybersecurity experience, Bachelor’s Degree and 3 years relevant information assurance or cybersecurity experience, Associates Degree and 6 years relevant information assurance or cybersecurity experience, High School/GED and 8 years relevant information assurance or cybersecurity experience.
Desired Qualifications:
Mentor, provide guidance and instructional aide to Associate and Junior ISSOs
Familiarity with conducting research and analysis, network and information system security principles and best practices
Knowledge of information security program management and project management principles and techniques.
Knowledge of security violation mitigation measures and incident reporting actions.
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of host/network access control mechanisms (e.g., access control list).
Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data.
CDT is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class.#J-18808-Ljbffr
: CDT is looking to add an experienced Information Systems Security Officer maintain security operations to various specialized applications. This position will be onsite in Chantilly, VA.
Clearance
: An active Top Secret/SCI clearance with CI Poly is required. Candidates who do not meet these clearance requirements will not be considered.
Responsibilities:
Thorough understanding and application of network security principles, practices, and implementations.
Working knowledge of cross-functional integration of information systems into a physical security environment.
Working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
Understanding of system methodologies including but not limited to client server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, LAN, switches, and routers.
Familiarity with detecting and preventing computer security compromises in a networked environment.
Working knowledge of configuration management; system maintenance; and integration testing.
Proficient in the use of tools used to prevent and/or negate malicious code.
Understanding of COTS tools that scan at the physical layer of all removable and fixed media types including but not limited to: (CDs, hard drives, thumb drives, Zip/Jazz, etc.).
Ability to decipher and explain in clear language Intelligence Community Directive (ICD) 503.
Ability to support forensics and evidentiary preservation.
Ability to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data.
Demonstrated ability to translate technical information and information technology jargon into plain English.
Ability to apply a risk management philosophy when faced with security challenges and the ability to articulate the pro’s and con’s in a clear concise manner.
Demonstrated proficiency with the following computer operating systems (e.g. Microsoft Windows, LINUX, UNIX, Mac OS, etc.).
Analytical ability to decipher complex technical configuration management documents.
Demonstrated proficiency with database maintenance.
Strong ability to elicit, articulate, and document information in a well-organized manner.
Demonstrated ability to work independent of close supervision.
Demonstrated experience with Microsoft Office Suite.
Working knowledge of all applicable NRO, IC, DoD policies, procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM).
Excellent communication, interpersonal, and team-building skills to engender rapport with the military personnel, civilians, and other contractors at all levels.
An ability to prioritize work to meet deadlines, and to manage the workflow of the ISSO team.
Demonstrated ability to correlate audit results between various systems and/or users and notify the ISSM of any discrepancies.
Master’s Degree and 2 years relevant information assurance or cybersecurity experience, Bachelor’s Degree and 3 years relevant information assurance or cybersecurity experience, Associates Degree and 6 years relevant information assurance or cybersecurity experience, High School/GED and 8 years relevant information assurance or cybersecurity experience.
Desired Qualifications:
Mentor, provide guidance and instructional aide to Associate and Junior ISSOs
Familiarity with conducting research and analysis, network and information system security principles and best practices
Knowledge of information security program management and project management principles and techniques.
Knowledge of security violation mitigation measures and incident reporting actions.
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of host/network access control mechanisms (e.g., access control list).
Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data.
CDT is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class.#J-18808-Ljbffr