[Close] 

Information Technology Security Analyst

Job Description
Establishes and satisfies complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports customers at the highest levels in the development and implementation of doctrine and policies. Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures. Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems. Designs, develops, engineers, and implements solutions that meet network security requirements. Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle. Reports status to leadership in accordance with reporting standards.
Typical Education & Experience
Typically a Bachelor's Degree and 2 years work experience or equivalent experience
Required Skills and Education

DoD 8570 Certification
IAT II


Preferred Skills and Education
Familiarity with NETCOM architecture, systems, networks, software, processes and procedures.
About BAE Systems Intelligence & Security
BAE Systems Intelligence & Security, based in McLean, Virginia, designs and delivers advanced defense, intelligence, and security solutions that support the important missions of our customers. Our pride and dedication shows in everything we do?from intelligence analysis, cyber operations and IT expertise to systems development, systems integration, and operations and maintenance services. Knowing that our work enables the U.S. military and government to recognize, manage and defeat threats inspires us to push ourselves and our technologies to new levels. That?s BAE Systems. That?s Inspired Work. Equal Opportunity Employer/Females/Minorities/Veterans/Disabled/Sexual Orientation/Gender Identity/Gender Expression. To see Inspired Work in action, visit www.baesystems.com and follow us on Facebook: www.facebook.com/baesystemsintel.
 

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Information Security Analyst
Scottsdale, AZ McKesson Corporation
Sr. Information Security Analyst
Sierra Vista, AZ Apex Systems
Information Security Analyst 4 - Cyber Threat ...
Chandler, AZ Wells Fargo
Director, Information Technology and Security
Tempe, AZ Comtech Telecommunications Corp
Information Technology Analyst - Principal
Sierra Vista, AZ Jacobs Engineering Group Inc.