[Close] 

Cyber Security Analyst

Alion Science and Technology delivers advanced engineering, IT and operational solutions to strengthen national security and drive business results. For customers in defense, civilian government and commercial industries, Alion's engineered solutions support smarter decision-making and enhanced readiness in rapidly-changing environments. The Cybersecurity Analyst will be a part of a team providing secure engineering expertise and technical management support to a Department of Defense program manager located at Wright-Patterson AFB, OH.  This individual will be responsible for implementing cybersecurity for Air Force weapon systems.  As part of this process, the cybersecurity Analyst will develop, coordinate, and maintain all documentation required in achieving Interim Approval to Test and Approval to Operate.  Additionally, they will be responsible for reviewing supporting program documentation such as, but not limited to:  Information Support Plan, Concept of Operations, Initial Capabilities Document, Program Protection Plans, and Capabilities Description Document. Responsibilities: Provide leadership in the design, testing and implementing of state-of-the-art secure operating systems, networks, and database products. Performs a wide range of security issues including architectures.   Involved in the implementation of new security solutions, participation in the creation and or maintenance of policies, standards, baselines, guidelines and procedures as well as conducting vulnerability audits and assessments. Lead projects and/or provides work leadership and training to less experienced Analysts. Ensure the design and execution of vulnerability assessments, penetration tests and securityaudits and provides recommendations for application design. Perform analysis at many levels of total system product, including: concept, design, fabrication, test, installation, operation, maintenance and disposal. Use, penetration and vulnerability analysis of various security technologies, and information technologysecurity research. Ensure the logical and systematic conversion of customer or product requirements into total systems solutions that acknowledge technical, schedule, and cost constraints. Integrate new architectural features into existing infrastructures, designs cybersecurity architectural artifacts, provides architectural analysis and relates existing system to future needs and trends. Participate in the creation and enforcement of enterprise security documents (policies, standards, baselines, guidelines and procedures). Maintains documentation, procedures and working instructions in accordance with federal and departmental guidelines. Provide consultation to management and makes recommendations in the areas of security and enhancements to improve overall enterprise security. Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved securityprocesses and the development of new attacks and threat vectors. Ensure the review of proposals, including gathering facts, analyzing data and preparing project overview which compares alternatives in terms of cost, time, availability of equipment and personnel, etc. Recommends course of action. Provide training and leadership to less experienced Analysts. Perform additional duties and responsibilities as assigned. Demonstrate knowledge of state-of-the-art secure operating systems as well as data security across multiple computer platforms. Ability to communicate effectively and clearly present technical approaches and findings. Ability to apply technical expertise, and has knowledge of other related disciplines.Ability to work effectively in a diverse work group. Qualifications: Candidates must have a demonstrated understanding of technical, engineering, and programmatic capabilities related to national security systems and information technology.  Experience in both acquisition and cybersecurity is preferred.   The candidate should have experience in the DoD Risk Management Framework and Air Force assessment and authorization process, risk analysis, and working knowledge of architecture configurations for weapon systems.   Successful applicants must have a current working knowledge of applicable security DoD and Air Force instructions and policies with respect to Risk Management Framework and Platform Information Technology (PIT) Assessment and Authorization (A&A).  Applicants must be familiar with and be able to apply the principles, criteria, and procedures of guidance which includes, but is not necessarily limited to, FIPS 199, NIST SP 800-53 Revision 4, CNSSP 15, CNSSI 1253, DoDI 5000.02, DoDI 8500.01, DoDI 8510.01, Director of Central Intelligence (DCID) 6/3 Manual, Joint Air Force--Army--Navy (JAFAN) 6/3, JAFAN 6/9 Manuals, and AFI 33-210. Bachelor's degree (Masters desired) and 5 years of relevant DoD work experience is required.   Applicants selected will be subject to a background investigation. 26947
Salary Range: NA
Minimum Qualification
5 - 7 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.