The IA Specialist will be required to work closely with the Government IAM, IAO, and IA specialist, providing the appropriate documentation to support accreditation for the production environment and maintain proper IA posture of the development environment.
In this role, you will provide security policy interpretation, research, and development; information systems security; information technology research and analysis work; cyber security planning and implementation; industrial security work.
In this role, the selected candidate will review and evaluate Information Systems Design Plans, Continuity of Operation Plans, Communication Plans, engineering change proposals and configuration changes for compliance with relevant security regulations, policies, and best industry practice.
In this role, you will provides system design expertise to ensure that as new systems are designed, security implications and security requirements are incorporated into the system from the initial design phase.
In this role, you will perform analysis on logs produced by network devices utilized within the OCC such as firewalls, content filtering, syslog from various sources/devices, assorted Intrusion Detection capabilities, substantiating vulnerability scanner results, directory services, DHCP logs, Secure Email Gateway logs, and approved OCC applications.
In this role, you will provide security policy interpretation, research, and development; information systems security; information technology research and analysis work; cyber security planning and implementation; industrial security work; information technology policy/guidelines development; and information security work.
In this role, you will design, develop, and coordinate the implementation of solutions that meet security requirements. The selected candidate will also provide integration and implementation of the computer system security solution.
In this role, the selected candidate will ensure and maintain IAVA and STIG compliance and review all change requirements of the systems; perform assessments of new technologies being implemented at the various stages of the Systems Engineering Lifecycle.
In this role, you will be responsible for
manage information-related risks in enterprise architectures, acquisition strategies, and testing and evaluation, and work to achieve cyber security Certification and Accreditation (C&A).
In this role, you will establish complex operational software configuration controls and system interfaces for computer system(s) assigned. He / She will also analyze and troubleshoot system anomalies to ensure optimum equipment performance.