• Information Security Specialist

    Job ID 2018-2690
    Job Locations
    US-LA-Fort Polk
    Category
    IT: Information Assurance / Quality / Cyber Security
    Type
    Regular Full-Time
  • Overview

    NCI is a leading provider of enterprise solutions and services to U.S. defense, intelligence, health and civilian government agencies. Coupled with a refined focus on strategic partnerships, we are successfully bridging the gap between commercial best practices and mission-critical government processes. Core competencies include:

    • Artificial intelligence
    • Agile digital transformation
    • Advanced analytics
    • Hyperconverged infrastructure solutions
    • Cyber security and information assurance
    • Fraud, waste and abuse
    • Engineering and logistics

    MF18

    NCI has been designated a 2018 Military Friendly Employer by MilitaryFriendly.com 

     

    Headquartered in Reston, Virginia, NCI has approximately 2,000 employees operating at more than 100 locations worldwide.

    Responsibilities

    NCI: As a Information Security Specialist on, you will have the opportunity assist our team in the support of the US Army, and provide congenial customer service and in-depth technical systems support. This challenging position will require a vast array of technical and communication-skills to support the technical and customer-related activities. Additionally, this position will support a wide variety of other activities from low-level design, to operating system and application support, to various hardware support activities in a fast-paced environment. In assuming this position, you will be a critical contributor to meeting NCI's mission: To deliver innovative, cost-effective solutions and services that enable our customers to rapidly adapt to dynamic environments.

     

    Highlights of Responsibilities:

    • Develops, maintains, and implements information security standards, procedures, and guidelines
    • Ensures that systems and organizational database are protected from unauthorized access and use
    • Monitors systems, identifies threats, and handles disaster recovery
    • Documents computer security and emergency measures policies, procedures, and tests
    • Encrypts data transmissions and erects firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers
    • Develops plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs
    • Reviews violations of computer security procedures and discusses procedures with violators to ensure violations are not repeated
    • Monitors use of data files and regulates access to safeguard information in computer files
    • Monitors current reports of computer viruses to determine when to update virus protection systems
    • Modifies computer security files to incorporate new software, correct errors, or change individual access status
    • Performs risk assessments and executes tests of data processing system to ensure functioning of data processing activities and security measures
    • Confers with users to discuss issues such as computer data access needs, security violations, and programming changes
    • Trains users and promotes security awareness to ensure system security and to improve server and network efficiency
    • Coordinates implementation of computer system plan with establishment personnel and outside vendors
    • Provide operational and technical support relating to information systems security, Host Based Security System (HBSS), and other security devices for compliance with DoD, Army, NETCOM, and local Information Assurance policies and regulations
    • Provides RMF support such as assessing controls and producing artifacts meet all RMF requirements
    • Build queries and reports in ePO server for monitoring compliance and reporting purposes
    • Utilize automated compliance assessment and reporting tools, like Assured Compliance Assessment Solution (ACAS), to ensure IAVM tracking is being conducted, reported and remediated for all networked assets in all areas of responsibility
    • Implements patch management actions to include installing patches and verifying vulnerability compliance
    • Ensures any information systems involved in unauthorized disclosure of classified information was reported and handle in timely manner according to Army and DOD policies and procedures

     

    Qualifications

    MINIMUM REQUIREMENTS:

    • Active Secret security clearance
    • Security+ (prior to start).
    • Certification of ACAS, HBSS or CompTIA CASP (must be able to obtain within 6 months of start date). RMF training and experience a plus.
    • Bachelor's degree and two (2) to seven (7) years of related experience, or at least nine (9) years of directly relevant technical experience. 

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed

    Connect With Us!

    Not ready to apply? Connect with us for general consideration.