Employers:   Post Jobs   |   Search Resumes
jobs.net logo

Cybersecurity Officer – Redstone Arsenal, AL – TS/SCI

Company: N/A

Location: Huntsville, AL

Pay: N/A

Contact Information

Name: n/a
Phone: n/a
Fax: n/a
Apply Online

Job Description

Job Description

Contract: Army G2 ARIES

Position: Analyst, Information Security - Cybersecurity Officer (L2)

Location: Redstone Arsenal, AL

General Summary:

GDIT is seeking candidates to support the US Army G2.  Under the Army Intelligence Information Technology Environment Support (ARIES) task order, the G2 supports numerous Army organizations providing mission critical intelligence tailored to the needs of Army senior leaders throughout the globe.  The ability of these organizations to provide this needed intelligence is dependent on the availability and successful operation of their Information Technology (IT).  The ARIES contract provides IT repair, maintenance, operations, logistics, engineering and cybersecurity services to ensure secure, reliable, and uninterrupted availability of the organization’s IT systems.

Principal Duties and Responsibilities:

Cybersecurity Officer will:

  1. Plan and coordinate the IT security programs and policies. Manage and control changes to the system and assess the security impact of those changes. Obtain C&A for systems under their purview. Serve as the Approval Authority for systems under their control
  2. Ensure that the architecture and design of DoD information systems are functional and secure
  3. As needed, design and develop IA or IA enabled products, interface specifications, and approaches to secure the environment
  4. Assess threats to the environment
  5. Develop and update the system security plan and other IA documentation
  6. Provide inputs on the adequacy of security designs and architectures
  7. Participate in risk assessment during the certification and accreditation process
  8. Provide support for a program, organization, system or enclave's information assurance program
  9. Provide security certification test and evaluation of assets, vulnerability management and response, security assessments, and customer support
  10. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies
  11. Maintain operational security posture for an information system or program to ensure information system security policies, standards, and procedures are established and followed
  12. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
  13. Evaluate security solutions to ensure they meet security requirements for processing classified information
  14. Provide configuration management (CM) for information system security software, hardware, and firmware
  15. Prepare documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and Systems Requirements Traceability Matrices (SRTMs)
  16. Provide support to the Information Systems Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
  17. Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
  18. Provide CM for security- relevant information system software, hardware, and firmware
  19. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
  20. Develop system security policy and ensures compliance. Administer the user identification and authentication mechanism of the information systems

Desirable Skills / Experience:

  1. Possess working knowledge of Assessment and Authorization practices within DoDI8510.01, ICD 503, CNSSI 1253, and the Risk Management Framework (RMF) process including various security tools (ACAS, HBSS, etc)
  2. Knowledge of data security administration principles, methods, and techniques
  3. Familiarity with domain structures, user authentication, and digital signatures
  4. Understanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policies


  1. DoD 8570.01-M IAT Level II Computing Environment (CE) Certification as determined by the Program Manager is required prior to support on contract
  2. Required Security Environment Certification: CompTIA Security+ CE or equivalent
  3. Desired Computer Environment Certification: CCNA-Security, CSA+, CASP CE, Associate of (ISC)2, CISSP, or equivalent

Security Clearance:

TS/SCI required

Additional Qualifications:

  1. Candidates must be willing and able to attain a CI Polygraph for certain positions as determined by the contract.
  2. Applicants must be able to deploy to potential hazardous duty locations due to mission requirements..
  3. Candidates must be able to maintain compliance with the standards of fitness requirements at all times throughout the period of performance of the task order.


High School Diploma/GED with 8 years of related experience, or Associate’s Degree with 6 years of experience, or Bachelor’s Degree with 4 years of experience


2-5 years of related experience in data security administration


As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.


Job Requirements