Careers

Senior Cybersecurity Analyst

  • Integration Innovation
  • Huntsville, ON P0B, Canada
  • Nov 09, 2020
[Information Technology]

Job Description

i3 is seeking a Senior Cybersecurity Analyst! The Sr. Cybersecurity Analyst supports regular audits on computer systems and networks to determine if they are operating securely and that data is protected from both internal and external threats. They make assessments of assigned systems to determine the system security status and ensures compliance to security policies, procedures and standards with regards to Risk Management Framework (RMF). Additionally, the Sr. Cybersecurity Analyst will support compliance with software assurance cybersecurity policies and procedures to include coordination of approval efforts with various Army and DoD organizations and approval authorities.Perform Army RMF assessments for software applications, Army Information Systems and Closed Restricted Networks.Designs and recommends security policies and procedures.Manages information systems and assess-only packages using eMASS.Develops policy governing the organizations information systems.Monitors, evaluates, and maintains systems according to DoD and industry security best practices and safeguards internal information systems and databases.Reviews system configurations to ensure compliance with security requirements and complies with established standards.Investigates security violations and recommends solutions.Provides reports to internal and external customers in response to queries and requests for computer security information.Consults on tasks, provides leadership and guidance for others.Gives recommendations for product upgrades, patches and general security measures to secure and/or mitigate threats for various clients.Bachelor s degree and 10 years of relevant experience.Experience working with system/network vulnerability scanning tools.DoD 8570 Compliance preferred.Ability to obtain/maintain Active Secret Security Clearance.Expert knowledge on RMF/Assess-only processes, approval chains, and local installation reporting chains.
Associated topics: cybersecurity, identity, identity access management, idm, information technology security, leak, protect, security, security engineer, security officer