In this role, you will perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy.
In this role, you will provide technical expertise, programmatic, and operational planning support for implementing end point security products across the DODIN enterprise and provide status update briefings.
In this role, you will be responsible for
provide evidentiary requirementssuch as executing forensics technical and gathering results on any computingassets such as mobile devices to support any investigation, inquiry, orlitigation.
In this role, you will be responsible to provide subject matter expertise with security classification guidance and assessments of classified and controlled unclassified information campaigns and program tools.
In this role, the successful candidate will work closely with developers to identify the appropriate certification/approval processes and authorities; record/register actions concerning project approvals to operate in the C&A database.
In this role, the selected candidate will assist with establishing and maintaining historical records of each Pods programs security architecture; research, identify, and evaluate vulnerabilities posed by potential research performers.
In this role, the selected candidate will develop and reviews policies, standards and procedures that meet approved policy and regulatory requirements, and amends existing programs to meet current requirements.
In this role, the selected candidate will perform independent compliance reviews, tracking, and continuous monitoring of newly submitted C&A packages; maintain a document repository where C&A project documentation is stored.
In this role, you will be responsible for reviewing and emerging Cyberspace policies and procedures and integrating them into the Army's Cyberspace and Cyber Operations Strategy, and synchronizing Army's approach with DoD, Joint, and National strategies.
In this role, the selected candidate will develop, implement, maintain and oversee enforcement of policies, procedures and associated plans for system security administration and user system access based on industry-standard best practices.