In this role, the selected candidate will coordinate and implement solutions and procedures in accordance with policy for effective security of data on desktop and laptop systems (e.g., lost laptops, decommissioned laptops/desktops, etc.).
In this role, you will designs, tests, and implements secure networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and e Discovery actions. Conducts risk and vulnerability assessment at the network, system and application level.
In this role, the selected candidate will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
The Candidate is responsible for safegaurding Sensitive and/or Classified Data to include maintaining classification guidance for systems, providing classified handling, processing and discussion guidance. Manage the Vulnerability Management Process via the Enterprise Mission Assurance Support Service (eMASS). Perform IA Self-Assessment Security Review to ensure compliance.
In this role, you will assist with compiling and analyzing cyber threat information and making recommendations based on suspected or known context in order to draw insights and conclusions regarding its relative threat to General Dynamics; its Business Units; intellectual and physical property; and personnel
In this role, the selected candidate will perform periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
In this role, the selected candidate will administer and coordinate the DoD security program and other related security activities for an office or group to ensure compliance with government regulations and company policies and procedures.
In this role, the selected candidate will ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.