Information Systems Security Analyst with Secret Clearance jobs in United States
cer-icon
Apply on Employer Site
company-logo

CALNET, Inc. · 2 weeks ago

Information Systems Security Analyst with Secret Clearance

CALNET, Inc. is a rapidly growing company in the Technology, Intelligence Analysis, and Language Services consulting arena. They are seeking an Information Systems Security Analyst with Secret Clearance to support a large IT Services Contract with the Navy in Dahlgren, VA, focusing on cybersecurity expertise and technical proficiency in various security methodologies.

Information Technology
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Cybersecurity principles, threats, vulnerabilities, and risk management processes
Encryption algorithms (e.g., Internet Protocol Security (IPSEC), Advanced Encryption Standard (AES), General Routing Encapsulation (GRE), Internet Key Exchange (IKE), Message Digest 5 (MD5), Secure Hash Algorithm (SHA), Triple Data Encryption Algorithm (3DES))
Data backup and recovery concepts and tools
Disaster recovery and continuity of operations planning
Host/network access control mechanisms (e.g., Access Control Lists (ACLs))
Incident response and handling methodologies
Intrusion detection methodologies and techniques
Network traffic analysis methods
Network protocols (Transmission Control Protocol /Internet Protocol (TCP/IP), and Open System Interconnection (OSI) model
System and application security threats and vulnerabilities (e.g., buffer overflow, cross-site scripting, SQL injection)
Security architecture concepts and enterprise architecture reference models
National and international cybersecurity laws, regulations, policies, and ethics
Current and emerging threats and threat vectors
Enterprise incident response program, roles, and responsibilities
Penetration testing principles, tools, and techniques
Computer networking concepts, protocols, and security methodologies
System performance and availability monitoring
System software and organizational design standards (e.g., International Organization of Standardization (ISO) guidelines)
System life cycle management principles, including software security and usability
System/server administration and systems engineering concepts and methods
Server and client operating systems
Network security architecture concepts (topology, protocols, defense-in-depth)
Network systems management principles and tools
Basic system administration, network, and operating system hardening techniques
Cloud computing service and deployment models (SaaS, IaaS, PaaS)
Cloud security strategy and architecture
Data security standards Personally Identifiable Information (PII), Payment Card Information (PCI), Protected Health Information (PHI)
Information security program management and project management principles
Resource management principles and techniques
Risk management processes (assessment and mitigation)
Secure acquisitions (e.g., Contracting duties, secure procurement, supply chain risk management)
Information technology (IT) supply chain security and risk management
Applicable laws, statutes, Presidential Directives, and guidelines related to cybersecurity and privacy
Organizational risk tolerance and risk management approach
Critical IT procurement requirements

Qualification

Cybersecurity expertiseIncident response methodologiesPenetration testingCloud security architectureData backupRecoveryNetwork protocolsSystem administrationRisk management processesResource managementOrganizational risk toleranceProject managementCommunication skills

Required

Four (4) years of experience in Cybersecurity
Cybersecurity principles, threats, vulnerabilities, and risk management processes
Encryption algorithms (e.g., Internet Protocol Security (IPSEC), Advanced Encryption Standard (AES), General Routing Encapsulation (GRE), Internet Key Exchange (IKE), Message Digest 5 (MD5), Secure Hash Algorithm (SHA), Triple Data Encryption Algorithm (3DES))
Data backup and recovery concepts and tools
Disaster recovery and continuity of operations planning
Host/network access control mechanisms (e.g., Access Control Lists (ACLs))
Incident response and handling methodologies
Intrusion detection methodologies and techniques
Network traffic analysis methods
Network protocols (Transmission Control Protocol /Internet Protocol (TCP/IP), and Open System Interconnection (OSI) model
System and application security threats and vulnerabilities (e.g., buffer overflow, cross-site scripting, SQL injection)
Security architecture concepts and enterprise architecture reference models
National and international cybersecurity laws, regulations, policies, and ethics
Current and emerging threats and threat vectors
Enterprise incident response program, roles, and responsibilities
Penetration testing principles, tools, and techniques
Computer networking concepts, protocols, and security methodologies
System performance and availability monitoring
System software and organizational design standards (e.g., International Organization of Standardization (ISO) guidelines)
System life cycle management principles, including software security and usability
System/server administration and systems engineering concepts and methods
Server and client operating systems
Network security architecture concepts (topology, protocols, defense-in-depth)
Network systems management principles and tools
Basic system administration, network, and operating system hardening techniques
Cloud computing service and deployment models (SaaS, IaaS, PaaS)
Cloud security strategy and architecture
Data security standards Personally Identifiable Information (PII), Payment Card Information (PCI), Protected Health Information (PHI)
Information security program management and project management principles
Resource management principles and techniques
Risk management processes (assessment and mitigation)
Secure acquisitions (e.g., Contracting duties, secure procurement, supply chain risk management)
Information technology (IT) supply chain security and risk management
Applicable laws, statutes, Presidential Directives, and guidelines related to cybersecurity and privacy
Organizational risk tolerance and risk management approach
Critical IT procurement requirements
4 + years of Professional Experience in Cyber Security
Bachelor's degree in information technology or related field
IAT Level II – Security+ CE OR CCNA Security, OR CompTIA CySA+ OR GIAC GSEC or SSCP
Secret Clearance

Benefits

Medical
Dental
Vision
Life
Short- and long-term disability insurances
401(k)-retirement savings plan
Generous leave time

Company

CALNET, Inc.

twittertwittertwitter
company-logo
CALNET, Inc. is one of the fastest growing privately held companies in the Intelligence Analysis, Language Services, and IT consulting services arena.

Funding

Current Stage
Early Stage

Leadership Team

leader-logo
Andrea Ferris
Chief Financial Officer
linkedin
Company data provided by crunchbase