Information/Cybersecurity Analyst (ISA III)

San Diego, California, United States

Applications have closed

Sigma Defense Systems is a leading technology company serving the Department of Defense (DoD), providing tactical communications systems and services for digital modernization since 2006. Through our acquisitions of SOLUTE in January 2022 and Sub U Systems in May 2022, we have expanded our software and communications hardware solutions to better support JADC2, C5ISR, SATCOM, and DEVSECOPS for customers in the Army, Navy, Air Force, Marine Corps, and Space Force. Through a combination of hardware, software, and industry expertise, we provide a complete portfolio of solutions and services that accelerates information collection and sharing for faster decision making and better mission outcomes.

We are a company of innovative professionals thriving in a highly motivating work environment that fosters creativity and independent thinking. If you are a motivated individual with a desire to support our service men and women, now is a great time to join Sigma Defense!

We are seeking an Information/Cyber Security Analyst to provide the government with support for the follow-on system to the Naval Integrated Tactical Environment System (NITES), NITES Next.

This system will increase the capabilities ashore, afloat, and mobile METOC support for tactical operations.

This Analyst will primarily work with the government to ensure software development activities meet all security requirements and user workflow optimization.

Requirements

  • 3 years of experience as an Information Assurance Specialist or related position.
  • Experience with locating fixing and testing issues that result from Security Technical Implementation Guides.
  • Knowledge of the RMF process.
  • Familiar with the Defense Information Systems Agency Application Security.
  • Experience with JBoss 6.3 Enterprise Application Platform, STIG, V1R1, or latest version; Postgres Advanced Server 9 on Red Hat Linux (RHEL), V1R1 or latest version; Web Policy SRG; Host Based Security System McAfee Agent STIG.
  • Excellent organizational and analytical skills.
  • Strong admin/network admin skills.
  • Experience with Microsoft Office Suite of Program Tools.
  • Possess or ability to obtain a Secret security clearance.

Essential Job Responsibilities (not all-inclusive)

  • Must be able to perform Information Assurance responsibility within Technical Team
  • Must be able to lead and attend customer technical/cyber meetings
  • Must be able to lead and attend internal technical/cyber meetings
  • Must be able to take ownership or cyber security posture and report back any risks
  • Capability to manage Cyber/Information Assurance processes
  • Capability to manage Cyber/Information Assurance documentation
  • Capability to adopt a Risk Management Framework
  • Capability to manage Risk Management Framework responsibilities
  • Capability to read, own, and generate Risk Management documentation
  • Capability to implement cyber security protocols and resources
  • Capability to communicate Risk from a Cyber/information security position

Benefits

  • 401(k) Match
  • Medical, Dental, Vision, and more
  • Highly Competitive Salary
  • Educational Reimbursement
  • Paid Time Off & Paid Holidays
  • We are an equal opportunity employer. All applicants will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, marital status, veteran status or any other applicable legally protected status or characteristic.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Application security Clearance DevSecOps DoD Linux PostgreSQL Red Hat Risk management Security Clearance

Perks/benefits: 401(k) matching Competitive pay Health care

Region: North America
Country: United States
Job stats:  9  0  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.