Job Details

ID #54024894
Estado Maryland
Ciudad Aberdeenprovingground
Tipo de trabajo Full-time
Salario USD TBD TBD
Fuente Abacus Technology Corporation
Showed 2025-06-18
Fecha 2025-06-18
Fecha tope 2025-08-17
Categoría Etcétera
Crear un currículum vítae
Aplica ya

Information Assurance Specialist

Maryland, Aberdeenprovingground, 21005 Aberdeenprovingground USA
Aplica ya

Provide cybersecurity services to protect information and information systems from unauthorized access and to protect the data within systems. Validate technical standards and security policy for LAN topologies and components; identify and remediate security vulnerabilities. Administer HBSS. Perform scanning, analysis and remediation with the Enterprise provided tool and provide reports. Provide reports and documentation in support of the submission (and continuous monitoring) for the RMF. Assist with preparation for DISA CCRIs and other DoD or Department of the Army Cybersecurity related inspections/evaluations. Provide support for the DoD PKI service. Request, receive, install, and maintain accountability of system (server) PKI certificates and providing technical support for PKI. Provide DoD PKI services including directory support, certification validation, registration, interface to related Army systems, hosting of PKI-enabled servers, and required key management services, as well as PKI solutions for email, web applications, file transfer, and VPNs. Provide PKI authentication for users’ devices and applications to utilize global information services data and enable CAC Cryptographic Logon (CCL), when applicable, for controlling logical access. Register and install PKI certificates on Army-owned PKI protected devices. Utilize the eMASS to record RMF activities such as all relevant security controls. Perform vulnerability scans weekly.  Provide IAVA compliance and compliance monitoring of all network connected assets. Manage the IAVM program for all RNEC-Aberdeen managed devices for installation and customer activities.  Provide patches for each authorized PC baseline and server, as required.  Manage compliance reporting using ACAS to ensure that IAVM messages are acknowledged, corrective action implemented, extensions requested, compliance verified, and reporting data entered into required database/system.  Develop Mitigation Action Plan (MAP) and IAVM POA&Ms.  Perform network, workstation, and server scans and compile vulnerability reports to facilitate corrections.  Plan, detect, respond, investigate, and report malicious and unauthorized activities.  Conduct compliance checks for known or potential Communications Systems and System Support to all computer systems and network assets before the assets can be connected to the network.  Manage cybersecurity hardware and software changes for the installation.  Provide host-based firewall management for enterprise managed assets and workstations.  Determine abnormalities, attacks, damages, and unauthorized modifications in the network via mechanisms such as intrusion detection devices. 

Aplica ya Reportar trabajo