POSITION SUMMARY: With a wide range of knowledge, performs independent assessment of the information security posture of an organization using applicable tools. Assesses information network threats such as computer viruses. Operates vulnerability assessment equipment in support of penetration analyses. Provides guidance to less experienced information security professionals. Prepares evaluation reports. Recommends remedial action. DESCRIPTION: Monitors security systems, and analyzes potential threats and vulnerabilities to client systems. Develops new computer and network security systems, including both hardware and software. Coordinates technical incident response and remediation activities for client environments. Provides security analysis and consultation services for product, system and network architecture designs. Develops tools for operational use and analyzes current threats to information security and systems. Analyzes network traffic and alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms. Launches and tracks investigations to resolution. Composes and sends alert notifications. Analyzes security findings and data. Publishes reports and keeps metrics for client systems. Identifies trends and root causes of system failures or vulnerabilities. Maintains vendor and trusted partner relationships. Ensures that the Information Systems Security department's policies, procedures, and practices as well as other systems user groups are in compliance. Ensures that the physical environment of the computers and their terminals are properly secured. RESPONSIBILTIES/REQUIREMENTS: - DoD and U.S. Army Experience - Information infrastructure integration - Policy development, reports, information papers, briefings - Knowledgeable of Army Enterprise Network and DoD initiatives - Capacity domain portfolio management, integration - Knowledgeable of thin/zero client computing, unified capabilities, data center consolidation, cloud computing and Army enterprise architecture - Implementation of capability sets, oversight of IT requirements determinations and evaluations, and development of Army wide strategies - Special Programs/SA cyber security strategy, policy, and plans - Risk Management Framework (RMF) - Security control assessments and cyber security testing - Expertise in the resolution of special program spillage incidents - FISMA Compliance of Special Program/SA - SAP community COOP requirements and assessments - COOP policies, directives, IT designs, COOP compliance and coordination - IT domain governance, reviewing policies and implementations and adjudication issues EDUCATION & EXPERIENCE: Typically requires a bachelor's degree or equivalent and five to seven years of related experience. PHYSICAL DEMANDS: Normal demands associated with an office environment. Ability to work on computer for long periods, and communicate with individuals by telephone, email and face to face. Some travel may be required.
US-Fort Belvoir-VA-VIRGINIA SUBURBAN