Type of Requisition:
Clearance Level Must Currently Possess:
Clearance Level Must Be Able to Obtain:
Public Trust/Other Required:
Job Family:Cyber Security
Validate and verify system security requirements definitions and analysis and establishes system security designs.
Design, develop, implement and/or integrate IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements.
Design and develop new systems, applications, and solutions for external customer's
enterprise-wide cyber systems and networks.
Build IA into systems deployed to operational environments.
Assist architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application security policy and enterprise solutions.
Enforce the design and implementation of trusted relations among external systems and architectures.
Support the building of security architectures, Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis of cyber security features and relates
existing system to future needs and trends, embeds advanced forensic tools and techniques for attack reconstruction, provides engineering recommendations, and resolves integration and testing issues.
Assess and mitigate system security threats/risks throughout the program life cycle.
Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations.
Ensures system security needs established and maintained for operations development, security requirements definition, security risk assessment, systems analysis, systems design, security test and evaluation, certification and accreditation, systems hardening, vulnerability, testing and scanning, incident response, disaster recovery, and business continuity planning and provides analytical support for security policy development and analysis.
May interface with external entities including law enforcement, intelligence and other government organizations and agencies.
Additional Skills and Experience:
Scheduled Weekly Hours:40
T elecommuting Options:
Work Location:USA MD Fort Meade
Additional Work Locations:USA NC DurhamWe are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
Are you interested in an entry-level information technology (IT) role?Year Up is a one-year, intensive program that provides young adults with hands-…Read More
Hi, Hope you are doing great!! Position: Java developer Location: Owings Mills Maryland Long term contract We still have multiple Java openings with …Read More