Sr. Information Security Analyst
Hanscom Air Force Base, MA, United States
Abacus Technology
Company Description
Abacus Technology Corporation is a Federal government contractor and provider of enterprise information technology (IT) services and solutions. For 40 years, we’ve developed effective partnerships with government and industry to tackle business challenges and pressures for Federal Defense, Civilian, and Intelligence customers. Abacus maintains core competencies in: IT Infrastructure Support, Network Operations and Maintenance, Communication Solutions, Systems Engineering and Integration, Cyber Security / Information Assurance, Application Development, Program Management, and Business Transformation.
Job Description
- Provide support to ensure the continued upgrade, expansion, and integration of the Hanscom JWICS SCI architecture and infrastructure.
- Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information.
- Ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure.
- Respond to computer security breaches and viruses.
- Provide timely coordination and support to the Hanscom JWICS Site Information Systems Security Manager (ISSM) in all matters related to ICD 503 and RMF to ensure Hanscom JWICS maintains it Authorization to Operate (ATO) and high security posture
- Serve as controlled equipment custodian COMSEC, key member of configuration management team site ops, planning, disaster recovery and network encryption. Serves as principal tech advisor on system security documentation mandated by Intel community for SCI network segments. Specific tasks include:
- Operate and maintain customer’s JWICS LAN IAW ICD 503 and subordinate directives and guidance for information systems security in SCI Facilities and environments.
- Create and maintain JWICS User Accounts.
- Develop Computer Systems Requirement Documents (CSRDs) and Security Impact Analysis (SIAs) as required.
- Serve as alternate for Hanscom JWICS ISSO.
- Coordinate new Hanscom JWICS connections and configuration management change requests.
- Maintain mail distribution lists and customer Security Groups for JWICs.
- Maintain and control access privileges to network resources.
- Maintain site-level TCP/IP and internet for JWICS and customer organizations.
- Maintain JWICs file servers.
- Install, monitor, maintain and ensure optimal system operations of communications devices. System hardware, servers, laptops, PCs, and peripherals such as printers, plotters, scanners.
- Test and configure new hardware.
- Obtain CSRD approval for systems prior to any system installation.
- Implement approved CSRDs as direct be government COTR.
- Augment/support IAO and Computer Security duties in SCIF, including prepare A&A documentation.
Qualifications
10+ years experience in information and cyber security. Bachelor’s degree in a related field. Additional years of experience may be substituted for degree requirements. Must be CISSP certified. Strong knowledge of Air Force, DoD and applicable Federal Cybersecurity Directives and Instructions. Able to work dynamically and effectively with people on projects (formal and informal) and conduct technical interchanges as required. Must be a US citizen and hold a current Top Secret clearance.
Applicants selected will be subject to a U.S. government security investigation and must meet eligibility requirements for access to classified information.
Additional Information
All your information will be kept confidential according to EEO guidelines.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CISSP Clearance DoD Encryption ICD 503 IT infrastructure RMF Security Impact Analysis TCP/IP Top Secret Top Secret Clearance
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Manager Pentest H/F jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open Forensics-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open Kubernetes-related jobs