Cyber Compliance Information Technology Analyst

Key Role:

Work as part of a Cybersecurity team, including assisting the Information System Security Manager (ISSM) with reducing or mitigating risks for information systems and maintaining the authority to operate. Perform vulnerability scans using ACAS to monitor several networks. Mitigate deficiencies and report full scan results to be posted in eMASS. Apply Security Technical Implementation Guides (STIGs) to multiple information systems, create STIG checklists, and upload to them eMASS. Travel to collect physical security artifacts required by the Risk Management Framework (RMF) for a remote location and process them for upload to eMASS.

Basic Qualifications: 

-Experience with information systems vulnerability scanning using ACAS

-Knowledge of STIG implementation

-Knowledge of RMF information assurance standards and practices

-Ability to obtain a security clearance

-HS diploma or GED

-Security+ CE Certification

Additional Qualifications:

-Experience with Information Assurance RMF requirements

-Knowledge of IT-related physical security guidelines

-Knowledge of Automated Data Processing Equipment (ADPE) policies

-Secret clearance

-ACAS Certification

Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.

#LI-AH1, CJ1

Not ready to apply? Join our talent community and sign up for job alerts.