• Cyber Security Specialist III

    Job ID 2018-2730
    Job Locations
    US-VA-Fort Belvoir
    IT: Information Assurance / Quality / Cyber Security
    Regular Full-Time
  • Overview

    NCI is a leading provider of enterprise solutions and services to U.S. defense, intelligence, health and civilian government agencies. Coupled with a refined focus on strategic partnerships, we are successfully bridging the gap between commercial best practices and mission-critical government processes. Core competencies include:

    • Artificial intelligence
    • Agile digital transformation
    • Advanced analytics
    • Hyperconverged infrastructure solutions
    • Cyber security and information assurance
    • Fraud, waste and abuse
    • Engineering and logistics


    NCI has been designated a 2018 Military Friendly Employer by MilitaryFriendly.com 


    Headquartered in Reston, Virginia, NCI has approximately 2,000 employees operating at more than 100 locations worldwide.



    NCI: As a Cyber Security Specialist, you will provide Cyber Security Technical subject matter expert (SME) support for Program Executive Office Soldier (PEO Soldier), Fort Belvoir, VA. You will support the PEO Soldier’s Chief Information Security Officer (CISO) and/or Cyber Security Manager, by demonstrating the following:


    • Oversee and assist PEO Soldier’s  Information Management Officers (IMOs), with establishing users accounts in the Army’s Training and Certificate Tracking System (ATCTS), Maintain training and certification records for Cyber Security personnel and user Cyber Security awareness training, updating information in the Global Address List (GAL), assist Information System Owners (ISO) with the registration of IT Systems and Devices into the Army’s Portfolio Management Solution (APMS), and registration of those same IT Systems and Devices into the Enterprise Mission Assurance Support Service (eMASS). All IT products and or services, are subject to vulnerabilities and man-made or natural threats.
    • Applying cyber security and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data;
    • knowledge of Risk Management Framework (RMF) requirements;
    • Knowledge of computer networking concepts, and network security methodologies;
    • Knowledge of incident response and handling methodologies;
    • Knowledge for NIST Special Publications (e.g., SP 800-53, SP 800-37, etc.);  
    • Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
    • You will be responsible for mitigating vulnerabilities and threats, and ensuring the operational resilience of those IT Systems and Devices that enhances the lethality and mission success for our Soldiers.


    Highlights of Responsibilities:


    • Support the PEO’s mission to provide SME guidance concerning all aspects of IT governance and cybersecurity, e.g. risk evaluation, throughout the entire IT Lifecycle from pre-conception to decommissioning and provide essential information to decision makers.
    • Is fully engaged in the PEO’s governance of the Department of Defense (DOD) Operation of the IT Life Cycle and Risk Management Framework (RMF) providing outreach, guidance and support to Project and Product Management Offices, as they build, buy or lease IT products or services.
    • Coordinates and Assist Product Managers (PdMs), with technical aspects of cyber security into the entire life-cycle from idea, to conception, test, interoperability, training, fielding, authorization, maintenance and decommissioning
    • Develop and incorporate the NIST Cybersecurity Framework, DoD Cybersecurity Strategy, and current civilian Blue Team best practices to prepare, detect, monitor, protect, analyze and defend against evolving cyber threats and attacks.
    • Assist the CISO on all matters relating to the building, buying or leasing of Information Technology (IT) Systems, National Security Systems (NSS) and devices.
    • Supports the PEO Soldier CISO to maintain DOD Inspector General (IG) Command Cyber Readiness Inspection (CCRI), Clinger-Cohen Act, Privacy, and Federal Information Security Modernization Act (FISMA) and any other compliance reporting.




    • CompTIA Security + Continuing Education (CE)
    • Knowledge of but not limited to: integration of computer hardware and software, tactical networking, and satellite communications to determine the cyber security survivability posture of assigned PEO Soldier system software and implementation in the framework of Risk Management throughout the materiel’s life cycle.
    • Disciplines to work as a Cyber Security Professional, with knowledge of Cybersecurity Integration concepts, principles, methods, and practices on a variety of acquisition issues to serve as cybersecurity technical expert to the CISO and CIO.
    • Knowledge of analytical methods and practices to conduct analyses of problems and/or issues affecting assigned area of responsibility and recommend approaches and procedures in resolution of cybersecurity and integration problems.
    • Knowledge of RMF for tactical acquisition systems to ensure that acquisition Authorization to Operate (ATO) packages are prepared and maintained in accordance with the RMF.
    • Knowledge of NIST Special Publication 800-53 to ensure systems adhere to validation procedures and implementation guidelines.
    • Knowledge of cybersecurity for Programs of Records and Acquisition Systems to work with program managers to determine when new or updated authorizations are required.
    • Skill in oral and written communication to develop and maintain the organizational tactical security architecture plan; prepare and present reports and recommendations; and prepare and update manuals, instructions, and operating procedures.
    • Skill in applying: network standards, protocols, and procedures; capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware within the Army tactical network to address security plans for future systems (e.g. Cyber Range, data links, wireless internet, and Internet of Things (IoT), etc.).
    • Ability to conduct systems analysis and coordinate tactical cybersecurity architecture and integration for testing events.
    • Ability to evaluate prototypes, and computer applications from an operational test and evaluation perspective for cybersecurity to perform tactical cyber security test and evaluation.

    Education and Experience Requirements:

    • High School/GED AND 14 years translatable experience OR
    • Associates field AND 12 Yrs translatable experience OR
    • Bachelor in non-directly related field AND 10yrs translatable experience OR
    • Bachelor in directly related field AND 5yrs translatable experience OR
    • Masters in non-directly related field AND 5yrs translatable experience OR
    • Masters in directly related field AND some related course/lab work experience.
    • Active DoD Secret clearance required.  

    Preferred Certifications and Experience:

    • ISC2 Certified Information Systems Security Professional (CISSP)
    • ISACA Certified Information Security Auditor (CISA)
    • GIAC Certified Enterprise Defender (GCED)
    • GIAC Certified Incident Handler (GCIH)
    • GIAC Global Industrial Cyber Security Professional (GICSP)​
    • EC-Council Certified Ethical Hacker (CEHv9)
    • CompTIA Advanced Security Practitioner (CASP) Continuing Education (CE)
    • Cisco Certified Network Professional Security (CCNP-Security)​
    • Certified Cloud Security Professional (CCSP)
    • Amazon Web Services (AWS) Cloud Certification
    • Certified Wireless Network Administrator (CWNA)
    • Certified Wireless Security Professional (CWSP)
    • Certified Wireless Analysis Professional (CWAP)
    • Certified Wireless Design Professional (CWDP)
    • CompTIA Network+
    • Cisco Certified Network Associate (CCNA) Cloud, Security or Wireless
    • Cisco Certified Network Professional (CCNP) Security or Wireless
    • Linux Professional Institute (LPI) Certification
    • Strongly prefer and seek an incumbent with three plus (3+) years of experience with Cloud computing or Internet of Things (IoT) technologies
    • Be a subject matter expert or specialty in at least three (3) of the following domains one of which should include Wireless, IoT, or Cloud Security: Authentication and Directory Services, Identity Management, Network Security, Endpoint Security, Cloud Security, Internet of Things Security, Wireless Security, Intrusion Detection and Response, Mobile Security, Vulnerability Management, Data Loss Prevention, Software Security or Application Security.
    • Demonstrated skill in oral and written communication explaining complicated technical requirements or controversial issues in a succinct briefing and offering a recommended course of action (COA) to senior management officials for their decision.


    This position requires the ability to perform the below essential functions:

    • Sitting for long periods
    • Standing for long periods
    • Ambulate throughout an office
    • Ambulate between several buildings
    • Stoop, kneel, crouch, or crawl as required
    • Repeatedly lift and carry weight up to _25__ pounds
    • Travel by land or air transportation _10__ %


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed

    Connect With Us!

    Not ready to apply? Connect with us for general consideration.