Job Description Whats it like to be involved in the cybersecurity efforts for one of the defense industrys giants? Empowering and impactful. This role places you around some of the Navys Supercomputers, where youll be more than just a specialist; youll be an invaluable asset working hand-in-hand with a team of dedicated professionals and contractors on-site. As an Information Systems Security Officer (ISSO), your role is pivotal in ensuring the infrastructure meets and exceeds security requirements.
This position requires an understanding of a wide range of IT security practices and tools. Your day-to-day will be deeply integrated with the Department of Defenses (DoD) Navy Supercomputing Resource Centers (Navy DSRC) team. Together, you will be involved in a wide range of security issues including architectures, infrastructure, firewalls, electronic data traffic, and network access covering both vulnerability and compliance issues. You will use encryption technology, perform vulnerability analysis of various assets, and be involved in information technology security research. You may prepare security reports to regulatory agencies; participation in technical forums; and representing our company in joint meetings with the customer on IT Systems Security topics.
BAE Systems High-Performance Computing Modernization Program Integrated Technical Services Contract II (HITS-U II) directly supports the DoDs High Performance Computing Modernization Program (HPCMP) to deliver world-class supercomputing capabilities for the DoDs Research, Development, Test and Evaluation (RDT&E) community. Overall, this role is an invitation to be part of a transformative project, making tangible contributions to national security.
In this job, you will:- Offer comprehensive information assurance and cybersecurity support, integrating services such as data protection, malware detection, endpoint security, and more.
- Draft critical technical documents like Engineering Implementation Plans, System Design Plans, and Requests for Change, ensuring our systems are updated, robust, and compliant.
- Conduct risk assessments, evaluate security controls, review security audits, track Plans of Action and Milestones (POA&Ms), and manage accredidation efforts by gathering documentation for the Authority to Operate (ATO).
- Be an active member of a dynamic team, bringing your expertise to the table, discussing ideas, and ensuring our cybersecurity initiatives always remain one step ahead.
LI-VW1
LI-Onsite