Cyber Security, Information Assurance, and Data Governance

ISC Consulting Group, Inc.

Dawson-ISC Joint Venture’s primary commitment is to provide client driven excellence. This is only possible because of our most important asset, our people. We are recognized by our team members as the best place to work and develop a career, serving our clients with pride and professionalism.

The candidate shall provide USAICoE G6 specialized Cyber Security, Information Assurance and Data Governance knowledge. The candidate shall support in assisting and performing Cyber Security, Information Assurance and Data Governance in the executing cybersecurity inspections, certification and accreditation and development of Cyber Security, Information Assurance and Data Governance documentation. This will include but not limited to; network audit reports, scans, applied updates and patches, and system baselines approved by the government. The candidate shall comply with policies and regulations IAW ARIMS. The candidate shall provide the following cyber security, information assurance, and data governance services to include, but not limited to:
•Provide technical Cyber Security, Information Assurance and Data Governance support.
•This includes system and network architecture managements, classrooms, administrative and non-administrative areas for mitigations, configurations, updates and modifications.
•Provide technical Cyber Security and Information Assurance assistance and management including, but not limited system and network auditing, configurations, mitigations, reporting, reviews, pre-installation and post installation verification checks and testing, McAfee ePolicy Orchestrator (McAfee ePO) and Host Based Security System (HBSS) management. Submit for government approval Information Technology Requests (ITRs) for new classroom, administrative, IT, hardware, software and system requirements and Trouble Tickets (TTs) for pre-existing IT, hardware, software and system issues for USAICoE end-users and customers.
•Perform with government approval and concurrence technical verification and validation cybersecurity scans of system/network architectures ensuring an approved certification and accreditation (C&A) Authority to Operate (ATO) is maintained for secure operations.
•Comply with all required System Technical Implementation Guidelines (STIG) and Information Assurance Vulnerability Alert (IAVA) updates to all systems within the architecture. Maintain architecture compliance with all DoD, Army, and other applicable Government Agency configuration requirements, to include all applicable emerging and updated policies and regulations.
•Provide technical assistance to identify, mitigate and document vulnerabilities and risks using the Risk Management Framework (RMF) system and a Plan of Action and Milestones (POAM).
•Provide technical assistance in monitoring, reviewing, resolving, mitigating and making recommendations for government approval, in regards to least-privileged accounts, technical documentation, system and network hardware, software, applications, and operational performance and security. This also includes using technical and nontechnical tools to achieve system and network certifications, inspections, audits, and other internal and external compliance monitoring.
•Collaborate with USAICoE G6 to assist in establishing internal technical writing management procedures, processes and standards to ensure consistency and quality of technically develop documentation deliverables.
•Prepare and review, including but not limited to, plans, requirements, summaries, agreements, objectives, policies, strategies, justifications, memoranda, models, criteria, assessments and procedures to support the USAICoE IT program and mission area management. The contractor shall submit work products to USAICoE G-6 for review and approval.
•Provide records management support by documenting and maintaining records. This includes, but is not limited to procedures, plans, descriptive documents and best business practices. Records will be retained and disposed of with government approval.

Requirements:
•TOP SECRET clearance with access to SCI prior to employment.
•4 Years participating in systems management and design activities, and/or related B.S/ B.A in Engineering, Science, Math.
•Complete understanding and application of principles, concepts, practices, and standards.
•Exerts some influence on the overall objectives and long-range goals of the organization.
•Security+ certification required.
Company Description
ISC Consulting Group, Inc. is an Equal Employment Opportunity EEO/Affirmative Action Employer, committed to excellence through diversity. All eligible candidates (minorities, women, veterans, and individuals with disabilities), are encouraged to apply for position vacancies as appropriate. If you would like more information about your EEO rights as an applicant under the law, please click here to access the “EEO is the Law” poster. For more information please contact us at info@isc-cg.com.

To apply for this job email your details to rick.imholte@isc-cg.com

Apply using webmail: Gmail / AOL / Yahoo / Outlook


More Jobs Near You