This job board retrieves part of its jobs from: Toronto Jobs | Emplois Montréal | IT Jobs Canada

The hottest job offers in the state of Virgina

To post a job, login or create an account |  Post a Job


Cyber Security Associate 4 (ISSO)

Salient CRGT

This is a Full-time position in Quantico, VA posted January 23, 2022.

Are you looking for a new and exciting career opportunity?

Join our award-winning organization and work with some of the most talented minds within our Enterprise Technology and Innovation teams.

As a Salient CRGT employee, you get to be part of a best performing team supporting our nation’s most critical missions.

At Salient CRGT, we recognize that financial rewards and great benefits are important. That is why we offer competitive compensation and a diverse benefits package. Click here to learn more about our extensive benefits program.

Why Salient CRGT?

We’re passionate about the inspirational missions of our customers and we entrust our employees and teams to deliver exceptional performance to enable the safety, security, health and well-being of our nation.

We provide the tools and resources to help you be successful, and our culture fosters an environment in which idea sharing and collaboration is essential.

Are you ready to make a difference?

The ideal candidate will be responsible for:
Ensure FBI Information Systems (ISs) are operated, maintained, and disposed of in accordance with approved security policies and practices
Ensure that all users have the requisite security clearances, authorization, and need-to-know before granting access to the IS, and administering/witnessing signing ‘of user agreements and/or Rules of Behavior document
Ensure a secure process for disseminating, controlling, and managing the issuance of user identifications and passwords for assigned ISs, and providing authorized lists to appropriate system administrators
Works closely with the Network Architect and System Administrators to ensure security practices are followed according to FISMA
Ensure a secure process for managing changes in user access to ISs (as required access and need-to­ know change) and terminating user access when it is no longer required or authorized, according to established policy requirements
Ensure that system security requirements are addressed during all phases of the IS lifecycle
Ensuring implementation of a configuration management plan for software, hardware, and firmware is documented and maintained, and serving as a member of the Configuration Management Board, with ISSM and System Owner concurrence
Managing, reviewing, and releasing of media and/or memory components
Ensure the system audit log is configured to capture required audit elements; reviewing audit logs weekly; investigating anomalies and notifying the system owner, ISSM, and ESOC, and submitting security incident reports when appropriate.

Serving as a resource for recognizing and reporting IT security incidents
Conducting an immediate preliminary assessment when there is suspicion or evidence of a possible IS security incident to determine the sensitivity of the information potentially compromised, whether the information was subjected to loss, and whether unauthorized disclosure occurred
.Ensure _all IT security incidents or violations are reported to the CSO, ISSM, and ESOC via phone or Secret Enclave email, depending on urgency, and then submit a report through Security Incident Reporting System (SIRS)
In the event of an information spillage, performing a risk assessment on behalf of the SO to determine mitigation procedures, in consultation with the Intelligence and Risk Analysis Unit (IRAU), ESOC, and the ISSM
Determining, in consultation with IRAU and ESOC, when sanitizing and declassifying procedures detailed in PD 0506D, Destruction of Classified and Sensitive Material, must be implemented
Support the CSO in reinforcing to all employees (or to users of assigned systems) the IS Security Incident Response Program (Incident Response for FBI ISs Policy Guide (0924 PG)), and the responsibility for timely reporting of security incidents in accordance with the Security Compliance Program Policy
Coordinating with IT and security personnel in IS recovery and in the correction or mitigation of
causes of security incidents
Familiarity with the use and operation of Tennable Security System products in particular NESSUS and SecurityCenter
Annual review, training, and testing of IRP of assigned information systems

Bachelor’s with 8+ years (or commensurate experience)
At least 3 years serving as an Information Systems Security Officer (ISSO) at a cleared facility.
Minimum of 5 years work experience in a computer science or Information Assurance related field.
At least one of the following certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or other certifications exemplifying skill sets such as those described in DoD Instruction 8570.1 IAM Level III proficiency.
Familiarity with the use and operation of security tools including Tenable.

Nessus and/or SecurityCenter, IBM Guardium, HP Weblnspect, or like applications and Network Mapper (NMAP).
A bachelor’s or advanced degree in Computer Science, Information Assurance, or other cyber discipline is preferred. 
Top Secret (TS) OR Top Secret (SCI Eligible)

Salient CRGT is an Equal Opportunity Employer.

All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, age, sex, sexual orientation, gender identity or expression, veteran status, disability, genetic information, or any other factor prohibited by applicable anti-discrimination laws.