Sr. Information Security Analyst

Hanscom Air Force Base, MA, United States

Applications have closed

Company Description

Abacus Technology Corporation is a Federal government contractor and provider of enterprise information technology (IT) services and solutions.  For 40 years, we’ve developed effective partnerships with government and industry to tackle business challenges and pressures for Federal Defense, Civilian, and Intelligence customers.  Abacus maintains core competencies in: IT Infrastructure Support, Network Operations and Maintenance, Communication Solutions, Systems Engineering and Integration, Cyber Security / Information Assurance, Application Development, Program Management, and Business Transformation.

Job Description

  • Provide support to ensure the continued upgrade, expansion, and integration of the Hanscom JWICS SCI architecture and infrastructure.
  • Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information.
  • Ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure.
  • Respond to computer security breaches and viruses.
  • Provide timely coordination and support to the Hanscom JWICS Site Information Systems Security Manager (ISSM) in all matters related to ICD 503 and RMF to ensure Hanscom JWICS maintains it Authorization to Operate (ATO) and high security posture
  • Serve as controlled equipment custodian COMSEC, key member of configuration management team site ops, planning, disaster recovery and network encryption. Serves as principal tech advisor on system security documentation mandated by Intel community for SCI network segments. Specific tasks include:
    • Operate and maintain customer’s JWICS LAN IAW ICD 503 and subordinate directives and guidance for information systems security in SCI Facilities and environments.
    • Create and maintain JWICS User Accounts.
    • Develop Computer Systems Requirement Documents (CSRDs) and Security Impact Analysis (SIAs) as required.
    • Serve as alternate for Hanscom JWICS ISSO.
    • Coordinate new Hanscom JWICS connections and configuration management change requests.
    • Maintain mail distribution lists and customer Security Groups for JWICs. 
    • Maintain and control access privileges to network resources.
    • Maintain site-level TCP/IP and internet for JWICS and customer organizations.
    • Maintain JWICs file servers.
    • Install, monitor, maintain and ensure optimal system operations of communications devices. System hardware, servers, laptops, PCs, and peripherals such as printers, plotters, scanners.
    • Test and configure new hardware.
    • Obtain CSRD approval for systems prior to any system installation.
    • Implement approved CSRDs as direct be government COTR.
    • Augment/support IAO and Computer Security duties in SCIF, including prepare A&A documentation.

Qualifications

10+ years experience in information and cyber security.  Bachelor’s degree in a related field.  Additional years of experience may be substituted for degree requirements.  Must be CISSP certified.  Strong knowledge of Air Force, DoD and applicable Federal Cybersecurity Directives and Instructions.  Able to work dynamically and effectively with people on projects (formal and informal) and conduct technical interchanges as required.  Must be a US citizen and hold a current Top Secret clearance.

 

Applicants selected will be subject to a U.S. government security investigation and must meet eligibility requirements for access to classified information.

Additional Information

All your information will be kept confidential according to EEO guidelines.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: CISSP Clearance DoD Encryption ICD 503 IT infrastructure RMF Security Impact Analysis TCP/IP Top Secret Top Secret Clearance

Region: North America
Country: United States
Job stats:  4  0  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.