Computer Systems Analyst

Fidelity Technologies is seeking an experienced Computer Systems Analyst III – Information Systems Security professional to support the SUB CMS program. The qualified applicant will be well versed in all technical aspects of information systems security policy and compliance requirements in classified computing environments.This position is open in the following cities: Groton, CT, Norfolk, VA, Kings Bay, GA, Bangor, WA, San Diego, CA, and Pearl Harbor, HI.

The primary responsibility of the position include providing adequate security in a dynamic environment based on an assessment risk or vulnerability, information systems security support to the sites and program ensuring compliance with both government and corporate security policies and procedures working with fellow information security team members, program security, government security, and numerous program personnel to ensure a compliant information systems security program and ensuring system approvals to operate are attained and maintained.

The qualified candidate must be familiar with Department of Defense system authorization to operate processes and documentation system authorization artifacts such as DOD Operations Security (OPSEC) Program Manual, National Institute of Standards and Technology (NIST) Special Publication (SP 800-171), Information Assurance Standard Operating Procedures and/or System Security Plans, Privileged User’s Guides, Plan of Action and Milestones, Security Control Traceability Matrices, and will be required to support the development, review and submission of this documentation.

The ideal candidate must have a thorough understanding of functionality and capabilities of computer network defense technologies, to include: Router ACLs, Firewalls, Intrusion Detection /Prevention Systems (IDS/IPS), Anti-virus, Web Content Filtering.

The candidate should be well versed on Information Security requirements for Protection of Unclassified DOD Information on non-DOD systems, Transmission of Controlled Unclassified Information (CUI), Safe Access File Exchange (SAFE), in addition to having strong customer service skill, experience with DoD Security Technical Implementation Guides (STIG’s), compliance tools, auditing tools and performing system security audits and assessments.

This position requires strong critical thinking/analytical skills, creativity, and a proven drive for quality, and excellent oral and written communication skills. The selected candidate should require only general direction and oversight in the performance of their work and the development of their work products. The candidate should also be able to provide inputs for recommending information system security solutions.

Basic Qualifications:
At least one of the following certifications: CISSP, CASP, CISM, CISA, SSCP, Security+ .

Bachelor degree in a IT related discipline and certifications, and/or certifications with commensurate experience in lieu of degree accepted.

Knowledge of the Risk Management Framework.

Possess and maintain Active Secret Clearance.

Preferred Qualifications:
Experience implementing and assessing DoD information systems security controls

Experience with security hardening and assessment tools (SCAP, ACAS, HBSS, WASSP, Nessus, XACTA etc.)

Experience with security architectures, firewalls and network security controls

Strong organizational skills and ability to stay focused while managing multiple tasks concurrently

Hands-on experience with risk managed downloads, sanitization and destruction, contaminations, incident response, virus scanning, privileged user access, and hardware/software configuration management and verifying STIG compliance.

Strong Windows background with some knowledge of UNIX/LINUX. Possess knowledge of variety of computer software applications and hardware platforms, networking components and LAN/WAN architecture and protection.


Provide protection against computer network intrusions and data exfiltration, to include current and regularly updated malware protection services, e.g., anti-virus, anti-spyware, monitoring and control of inbound and outbound network traffic (e.g., at the external boundary, sub-networks, individual hosts) including blocking unauthorized ingress, egress, and exfiltration through technologies such as firewalls and router policies, intrusion prevention or detection services, and host-based security services, and the prompt application of security-relevant software patches, service packs, and hot fixes.

Processes requests to design, modify and grant security accesses, and other security requests.

Performs role-based access support, troubleshooting end-to-end user errors and issues, and performs end-to-end support on a variety of information security systems software.

Administers and maintains user access controls, processes, and procedures to prevent unauthorized access, modification, disclosure or misuse of USAA resources. Performs research, analysis and troubleshooting to identify, resolve, and explain complex security issues.

Schedules and conducts self-assessments of business applications to ensure compliance with published policies and standards. Collects, compiles, and generates information security reports on system and network accesses. Reports and prepares briefing packages for presentation to customers and management.

May process digital forensic investigation requests from internal departments to assist with investigations and presents findings and/or perform digital forensic investigations utilizing nationally accepted standards, applicable laws and regulations, company policies and best practices.

Identifies and analyzes business practice violations of information security policy and standards.

Participates in multiple projects as a team resource. May provide audit support.

Documents procedures, executes and improves operational processes.

The above duties reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.


. . . . . . . .

Leave a Reply