Logo
SPYROS I&T Consulting

Journeyman Information Security Analyst

SPYROS I&T Consulting, Columbia, Maryland, United States, 21046


Duties:Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information.May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure.May respond to computer security breaches and viruses.Ensures the rigorous application of cybersecurity policies, principles, and practices in the delivery of all Information Technology (IT) and cybersecurity services.Develops and designs security solutions to maintain confidentiality, integrity, and availability of information throughout the enterprise.Identifies, plans, and documents improvements to security controls.Develops and documents recommendations and courses of action (COAs) to solve complex cybersecurity problems.Develops and interprets cybersecurity requirements and assists in the formulation of cybersecurity/IT budgets.Plans and schedules the installation of new or modified security hardware, operating systems, and software applications.Ensures the assessment and implementation of identified computer and network environment fixes as part of the Cybersecurity Vulnerability Management program.Guides the implementation of appropriate operational structures and processes to ensure an effective cybersecurity program.Location:

Columbia, MD

Qualifications :

Possess an Active Top Secret clearance with SCI eligibility and Counterintelligence polygraphMinimum five (5) years of experience with cybersecurity or information assuranceMinimum of Bachelor's Degree in a technical or business discipline from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related disciplineOne of following security certifications (active status): CGRC, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO - (minimum DoD 8570 IAM Level II Certification)Must know Risk Management Framework (RMF)Experience with DoD Cybersecurity PoliciesExperience with Xacta Solutions (Xacta 360)Knowledge of Enterprise Mission Assurance Support Service (eMASS)Exposure to AWS (Amazon Web Services), ACAS (Security scanning software), vCenter, WSUS (Windows Server Update Service), and/or STIGs/IAVA