Sign Up Sign Up Log In Sign Up

Information Security Analyst - MUST HAVE TOP SECRET CLEARANCE

Job Description

Invent Your Future with CACI!

What You’ll Get to Do:

  • Apply current computer science technologies to the design, development, evaluation, and integration of computer systems and networks to maintain information assurance and ensure system security.
  • Provides security engineering and integration support. Involved in a wide range of security issues including architectures, electronic data traffic, and network access. Uses encryption technology; penetration and vulnerability analysis of various security technologies; and information technology security research.
  • Prepares Certification and Accreditation (C&A) reviews. Experience and working knowledge of Authority to Operate (ATO) Process.

More About the Role:

  • Responsible for program compliance and implementation for secure networks under government sponsorship.
  • Support implementation of certification test plans, vulnerability scans, and continuous monitoring task.
  • Responsible for providing information assurance support for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include the maintenance of authorization to operate IT systems, monitoring and testing of IT systems for vulnerabilities and prevention of compromise, support to incident response and remediation, implementation of appropriate policy, relevant user security awareness and training, and compliance with applicable government policies and directives.
  • Maintain day-to-day security posture and continuous monitoring of IS including security event log review and analysis.
  • Ensure system security measures comply with applicable government policies.
  • Provide support to the Information System Owner for maintaining appropriate operation information assurance (IA) posture for programs.
  • Conduct reviews and technical inspections to identify and mitigate potential security weaknesses, and ensure that all security features applied to a system are implemented and functional
  • Monitor and resolve Plan of Action and Milestones (POA&M) to mitigate system vulnerabilities on assigned Information Systems

You’ll Bring These Qualifications:

  • Must have an ACTIVE DoD Top Secret or higher clearance per contract requirement
  • College degree (B.S., M.S.) in Information Assurance, Computer Science, Information Management Systems or a related discipline
  • 10+ years professional related technical experience•
  • Demonstrated knowledge of National/DoD/Army Directive security policies including, but not limited to:DoD 5220-22-M, National Industrial Security Program Manual, incorporating Change 2
  • Defense Security Service, National Industrial Security Program (NISP) Assessment and Authorization Program Manual (DAAPM)
  • DOD Instruction 8510.01, Cybersecurity, Risk Management Framework (RMF) for DOD Information Technology (IT), 12 March 2014 Incorporating Change 2
  • NIST SP 800-53, Rev 4, Security and Privacy Controls for Federal Information Systems and Organizations
  • Demonstrated knowledge of DOD RMF accreditation implementation
  • Must be CISSP Certified
  • Experience with continuous integration tools and environments and the ability to identify and manage risk
  • Working knowledge of and ability to assist others in the use of information security provisioning and monitoring tools to support process improvement
  • Understanding of all elements of the DOD Cybersecurity policies and requirement
  • Ability to work independently and interact regularly with government and non-government stakeholders at multiple levels of authority
  • Must have knowledge of cross domain solutions (CDS)
  • Experience with DOD Security Technical Implementation Guides (STIG) and hardening operating systems, applications, and services in accordance with relevant STIGs
  • Experience with vulnerability assessment scanning and developing Plan of Action and Milestones (POAM)
  • Experience with Information Assurance Vulnerability Management (IAVM) to include tracking alerts, bulletins, and technical advisories

These Qualifications Would be Nice to Have:

  • Experience with enterprise-level deployments, to include customer governance, policy definitions, policy management and automation
  • Demonstrated experience using eMASS and VMS

What We Can Offer You:

- We’ve been named a Best Place to Work by the Washington Post.

- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.

- We offer competitive benefits and learning and development opportunities.

- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.

- For over 55 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.


Job Location



CACI employs a diverse range of talent to create an environment that fuels innovation and fosters continuous improvement and success. At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is proud to provide dynamic careers for employees worldwide. CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.

Company Name:
Security Clearance:
Linthicum, Maryland
United States
Not Specified
Job Number:

Send me email alerts for similar jobs