IA Sec Spec II with Security Clearance Arts, Media & Design Jobs - Fort Belvoir, VA at Geebo

IA Sec Spec II with Security Clearance

Requisition #:
IASEC003771 Job Title:
IA Sec Spec II Location:
5850 23rd Street Fort Belvoir, Virginia 22060 Clearance Level:
Active DoD -Top Secret Required Certification(s):
One or more of the following certifications:
CCNA Security, CSA+, GICSP, GSEC, SEC
CE, SSCP, CASP CE, CCNP Security, CISA, GCED, GCIH, CAP, GSLC, CND, Cloud+, CISSP (or Associate)SUMMARYThe Cybersecurity Directorate executes the Army's Senior Information Security Officer (SISO) duties per AR 25-2, and Army Senior Information Security Officer's duties per the Federal Information Security Modernization Act (FISMA) including the entire Cybersecurity spectrum.
The Cybersecurity Directorate's mission is to provide Cybersecurity product and policy expertise; tactics, techniques and procedures (TTP) expertise; and technical, management, and administrative support services to support Cybersecurity initiatives.
JOB DUTIES AND RESPONSIBILITIES The IA Security Specialist is responsible for the Supply Chain Risk Management (SCRM) process for the Army DCS, G-6 office.
Contractor shall play an integral role in the effort to manage risk by identifying, assessing, and mitigating threats, vulnerabilities, and disruptions to the DoD supply chain from beginning to end to ensure mission effectiveness.
Providing input to, and facilitation for, working groups tasked with the responsibility to ensure that mandated cyber security requirements are met.
Providing recommendations regarding system compliance, identification of systemic trends, and mitigation guidance.
Developing and maintaining associated plan of action memoranda.
Analyze assessment reports and synopsize cybersecurity findings in information papers and other written formats for submission to task lead.
Attend monthly meetings to represent Army positions on solutions.
Write executive summaries and information papers, as required, after attendance at meetings (monthly).
Analyze cybersecurity findings for Programs of Records and tactical networks and provide risk assessments, as required (monthly).
QUALIFICATIONSRequired Certifications One or more of the following certifications:
CCNA Security, CSA+, GICSP, GSEC, SEC
CE, SSCP, CASP CE, CCNP Security, CISA, GCED, GCIH, CAP, GSLC, CND, Cloud+, CISSP (or Associate)Education, Background, and Years of Experience 5
years of experience in the IT Cyber Security field.
Good knowledge/understanding of eMASS.
Experience in Risk Management Framework (RMF) Familiar with Army organizational structure, especially at the Headquarters level.
Experience with policy writing a plus.
Completion of Department of Defense training program focused on Information Technology, Cyber Security, Awareness, Anti-Terrorism and Operational Security ADDITIONAL SKILLS & QUALIFICATIONSRequired Skills Must be able to exhibit a positive outlook to create a positive environment.
Must be able to conduct business with integrity and moral courage.
Must possess a desire to consistently improve competency in technical and professional matters.
Must be a proficient performer as an individual and as a team.
Must exhibit the willingness to be proactive with customer needs.
Must be personable and professional to be able to interact with a wide range of customers in different environments.
WORKING CONDITIONSEnvironmental Conditions Standard office environment.
Strength Demands Light - 20 lbs.
Maximum lifting with frequent lift/carry up to 10 lbs.
A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.
Physical Requirements Stand or Sit; Walk; See About Us! Agile Defense provides leading-edge Digital Transformation solutions to support and advance our customers' mission.
We deliver innovative and high-quality services to our customers worldwide through an empowered and engaged workforce.
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental.
Our culture is alive and evolving, but it always stays true to its roots.
Here, you are valued as a family member, and we believe that we can accomplish great things together.
Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
We believe several attributes are the root of our very best employees and extraordinary culture.
We have named these attributes The 6 H's - Happy, Helpful, Honest, Humble, Hungry, and Hustle.
Happy:
We exhibit a positive outlook in order to create a positive environment.
Helpful:
We assist each other and pull together as teammates to deliver.
Honest:
We conduct our business with integrity.
Humble:
We recognize that success is not achieved alone, that there is always more to learn, and that no task is below us.
Hungry:
We desire to consistently improve.
Hustle:
We work hard and get after it.
These Core Values are present in all our employees and our organization's aspects.
Learn more about us and our culture by visiting us here.
COVID-19 Vaccination Requirements Agile Defense is subject to federal vaccine mandates or other customer/facility vaccination requirements as a federal contractor.
As such, to protect its employees' health and safety and comply with customer requirements, Agile Defense may require employees in certain positions to be fully vaccinated against COVID-19.
Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.
Recommended Skills Administration Agile Methodology Certified Information Security Manager Certified Information Systems Security Professional Cisco Certified Network Professional Customer Demand Planning Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.