UNIX Compliance Reviewer, Junior

The Challenge:

Warnings about cyber threats are everywhere and the constantly evolving nature of these threats can make understanding them seem overwhelming to DoD, Combatant Commands, and other federal government organizations. In all of this “cyber noise”, how can these organizations understand their risks and how to mitigate them? The answer is you – build your knowledge as an information security risk specialist who knows how to break down complex threats into manageable plans of action.

As an UNIX Compliance Reviewer on our team, you’ll work with the DoD and other federal government organizations to discover their cyber risks, understand applicable policies, and develop a mitigation plan. You’ll get technical, environmental, and personnel details from Security Professionals and Leaders, Systems Administrators, Network Administrators and Engineers, IAMs, and ISSOs to assess the entire threat landscape. Then, you’ll help your team guide your client through a plan of action with presentations, white papers, and milestones. You’ll work on translating security concepts for your client so they can make the best decisions to secure the client's information systems, assets, and enclaves possess the necessary security measures to ensure their availability, protection, integrity, authentication, confidentiality, and non-repudiation, including monitoring, detection, discovery, and reaction capabilities of internal and external adversaries and ensure a trained and effective IA workforce. This is your opportunity to take an active role in information security while growing your skills in conducting reviews of enterprises, enclaves, networks, systems and applications, certification and accreditation support, independent evaluation based on national and DoD-level Cybersecurity and IA and Cybersecurity Service requirements, and the procedures and practices as they are implemented by the combatant commands, including their sub-unified commands, joint task forces, component commands, and supporting organizations and agencies, to ensure their adequacy to provide a measurement and training tool to determine the defending force’s readiness and provide a basis for planning and programming needed improvements. Join us as we protect our military’s communications systems and our nation’s cyber infrastructure. This position requires the ability to travel up to 85% of the time CONUS and OCONUS.

Empower change with us.

You Have:

-Experience with various versions of UNIX operating systems on information systems (IS), including workstations, servers, and laptops, and network devices

-Knowledge of DoD STIGs and assessment tools

-Ability to consolidate, create, and brief findings based on analysis

-Ability to travel up to 85% of the time

-Top Secret clearance

-HS diploma or GED

-8570 IAT II Certification

Nice If You Have:

-TS/SCI clearance

-BA or BS degree

-CCRI Certification, including walk-through training courses, Onsite Shadowing, and Checkride of CCRI certification for UNIX, network vulnerability assessments, and security scanning

-8570 IAT III Certification

Clearance:

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required.

Build Your Career:

Rewarding work, fun challenges, and a ton of investment in our people—that’s Booz Allen cyber. When you join Booz Allen, we’ll help you develop the career you want.

Competitions — From programming competitions at our PyNights (Python competition and learning events) to competing in CTFs, we’ve got plenty of chances for you to show off your skills.

Paid Research — Have an innovative idea to explore or hypothesis to test? You can participate in challenges via our crowdsourcing platform, the Garage, and other programs to be awarded dedicated time and funding to advance your skills.

Cyber University — CyberU has more than 5000 instructor-led and self-paced cyber courses, a free online library that you can access from just about anywhere—including your phone—and certification exam prep guides that include practical assessments to prepare you for your exam.

Academic Partnerships — In addition to our tuition reimbursement benefit, we’ve partnered with University of Maryland University College to offer two graduate certificate programs in cybersecurity—fully funded without a tuition cap.

Maker/Hackerspaces — Race drones, print 3D gadgets, drink coffee from our Wi-Fi coffee maker, and get hands-on training on tools and tech from in-house experts in our dedicated maker and hackerspaces.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.

CMD

Not ready to apply? Join our talent community and sign up for job alerts.