Cyber Security Officer, Junior

Reston, VA

Full Time Entry-level / Junior
AnaVation is seeking a to join our team and support our mission critical customer in Reston, VA. As our Junior Cyber Security Officer, you will maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. 
Duties include but are not limited to: Performs a variety of Information Assurance (IA) and Computer Network Defense (CND) functions which are broad in nature and support multi-tier IA and CND functions to include, but not limited to, systems engineer, audit/inspection, infrastructure support, certification and accreditation, vulnerability management, detection and response support services. Provides support for a program, organization, system, or enclave’s information assurance program. Provides security certification test and evaluation of assets, vulnerability management and response, security assessments, and customer support. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Assessment and Authorization (A&A) packages, and Security Control Traceability Matrices (SCTMs). Executes policies and guidance provided by senior functional/technical leads. Plan and coordinate the IT security programs and policies. Manages and controls changes to the system and assessing the security impact of those changes. Manages and controls changes to the system and assessing the security impact of those changes. Obtain A&A for systems under their purview. Provide support for a program, organization, system, or enclave’s information assurance program. Serve as the Approval Authority for systems under their control.

Required Qualifications:

  • Clearance: Active TS/SCI Clearance
  • Education & Years of Experience: Bachelor’s degree and 2 years of experience related to specific functional area. 
  • Certifications: Currently hold, or be able to attain a CompTIA Security+ or equivalent IAT Level II certification. 
  • Experience and knowledge on:
  • Experience supporting cybersecurity oversight, collection, and analysis of threat intelligence, event analysis, and incident response. 
  • Experience supporting 24x7x365 operations in a cybersecurity, IT or related watch environment. 
  • Experience supporting reporting on daily performance and health metrics to provide ongoing situational awareness to Government leadership. 
  • Experience using incident case management systems to document and report on incidents. 
  • Experience following and improving Standard Operating Procedures (SOPs). 
  • Experience supporting vulnerability management, cyber threat intelligence, and fusion. 
  • Understanding of classified Government networks, technology stacks, and cybersecurity operations. 
  • Experience working individually as well as actively participating on integrated teams.

Desired Qualifications:

  • Security certifications: CCNA Security, CySA+, SSCP, or equivalent certification
  • AWS, Cloud certifications
Job region: North America
Job stats:  21  2  0
  • Share this job via
  • or

Other jobs like this

Explore more Cyber Security career opportunities

Find open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Analysis, Cryptography, Digital Forensics and Cybersecurity in general, filtered by job title or popular skill, toolset and products used.