Cyber Security Analyst

Recruiter
VT Group
Location
United States
Salary
Competitive
Posted
30 Sep 2022
Closes
28 Oct 2022
Job Type
Cyber Security
Employer Sector
Technology, IT & Telecoms
Contract Type
Permanent
Hours
Full Time
Overview VTG is searching for a Cyber Security Analyst professional who is interested in joining a fast–paced and dynamic work environment supporting Navy Shipbuilding. The candidate will provide direct support to the DDG 1000 Zumwalt Class Destroyer Program Office, working collaboratively with the Systems Engineering team and Cyber Security Analysts. The physical location of this position is flexible, (Hybrid) but ability to access a Navy Facility for SIPRNet is required. Responsibilities Provide expertise in Cyber Security engineering and Navy Risk Management Framework (RMF) process and validation. Conduct Assured Compliance Assessment Solution (ACAS) Nessus and Security Content Automation Protocol (SCAP) scanning. Identify, install, test and verify OS–level and software–level patches and/or Security Technical Implementation Guides (STIGs) in accordance with Information Assurance (IA) and Cybersecurity standards. Administer, develop, and manage IA and Cybersecurity processes for multiple systems in accordance with Department of Defense (DoD) standards. Process daily requirements in Enterprise Mission Assurance Support Service (eMASS) to include: Plan of Action and Milestones (POA&Ms); IA Vulnerability Alerts (IAVAs); Control Test Results (Control Correlation Identifiers CCIs ); Categorization forms; Ports, Protocols, and Services Management (PPSM) registrations; Security Assessment Plans (SAPs); System–Level Continuous Monitoring (SLCM) plans; and Inheritance updates. Author I–Assure RMF templates to be routed through DDG 1000 Program Office (PMS 500). Create Conditional Access Requests (CARs) & High Risk Escalations (HREs) for ISOs to be routed through CSRD. Complete DON Application and Database Management System (DADMS) and Vulnerability Remediation Asset Manager (VRAM) updates on a daily basis. Test and correlate STIGs and Security Requirements Guides (SRGs), mapping results to RMF policy and Standard Operating Procedures (SOPs). Create DoD approved diagrams from the DISM Connection Process Guide (CPG) to include Accreditation Boundary, Security Architecture, and Information Flow Management. Evaluate hardware and software, including peripheral, output, and related equipment. Participate in the development and implementation of network–related procedures and standards. Develop and implement testing strategies and document results. Troubleshoot and resolve complex problems. Maintain current knowledge of relevant hardware and software applications as assigned. Qualifications Required skills: Bachelor's Degree in Computer Science, Electrical/Computer Engineering or the equivalent combination of education, technical certifications and/or training and work experience. 5 years of directly related experience in network administration and support of Microsoft and/or Linux–based systems. 3 years of directly related RMF experience or DoD Information Systems Security Engineering (ISSE) experience. Must have CompTIA Security+ or be able to obtain this certification within 90 days of employment. Must have an Active DOD Secret Clearance Preferred skills: Prior Navy cyber Required skills: Bachelor's Degree in Computer Science, Electrical/Computer Engineering or the equivalent combination of education, technical certifications and/or training and work experience. 5 years of directly related experience in network administration and support of Microsoft and/or Linux–based systems. 3 years of directly related RMF experience or DoD Information Systems Security Engineering (ISSE) experience. Must have CompTIA Security+ or be able to obtain this certification within 90 days of employment. Must have an Active DOD Secret Clearance Preferred skills: Prior Navy cyber Provide expertise in Cyber Security engineering and Navy Risk Management Framework (RMF) process and validation. Conduct Assured Compliance Assessment Solution (ACAS) Nessus and Security Content Automation Protocol (SCAP) scanning. Identify, install, test and verify OS–level and software–level patches and/or Security Technical Implementation Guides (STIGs) in accordance with Information Assurance (IA) and Cybersecurity standards. Administer, develop, and manage IA and Cybersecurity processes for multiple systems in accordance with Department of Defense (DoD) standards. Process daily requirements in Enterprise Mission Assurance Support Service (eMASS) to include: Plan of Action and Milestones (POA&Ms); IA Vulnerability Alerts (IAVAs); Control Test Results (Control Correlation Identifiers CCIs ); Categorization forms; Ports, Protocols, and Services Management (PPSM) registrations; Security Assessment Plans (SAPs); System–Level Continuous Monitoring (SLCM) plans; and Inheritance updates. Author I–Assure RMF templates to be routed through DDG 1000 Program Office (PMS 500). Create Conditional Access Requests (CARs) & High Risk Escalations (HREs) for ISOs to be routed through CSRD. Complete DON Application and Database Management System (DADMS) and Vulnerability Remediation Asset Manager (VRAM) updates on a daily basis. Test and correlate STIGs and Security Requirements Guides (SRGs), mapping results to RMF policy and Standard Operating Procedures (SOPs). Create DoD approved diagrams from the DISM Connection Process Guide (CPG) to include Accreditation Boundary, Security Architecture, and Information Flow Management. Evaluate hardware and software, including peripheral, output, and related equipment. Participate in the development and implementation of network–related procedures and standards. Develop and implement testing strategies and document results. Troubleshoot and resolve complex problems. Maintain current knowledge of relevant hardware and software applications as assigned.