Sr. Cybersecurity (CND-SP) Auditor/Inspector - TS/SCI required in Fort Belvoir, VA at General Dynamics Information Technology

Date Posted: 9/7/2020

Job Snapshot

Job Description


GDIT is seeking candidates to support the US Army Intelligence and Security Command (INSCOM). Under the I2TS 3 task order, INSCOM ensures reliable, uninterrupted availability of Command, Control, Communications, Computers, and Information Management (C4IM), including networks, hardware, software, engineering, and specialized tools at the point of customer need to support INSCOM's mission. INSCOM and its MSCs provide the enabling layer to connect the Army and its tactical formations to defense and national intelligence agencies via tactical networks. The ability to deliver mission-critical intelligence is dependent on the successful use of its information technology (IT) networks worldwide.

Principal Duties and Responsibilities:

The analyst maintains smooth operation of multi-user computer systems, including coordination with network engineers. Sets up administrator and service accounts, maintains system documentation IAW with DOD and INSCOM'S policies, tunes system performance, installs system-wide software, and allocates mass storage space. Interacts with users and evaluates vendor products. Makes recommendations to purchase hardware and software, coordinates installation, and provides backup recovery. Develops and monitors policies and standards for allocation related to the use of computing resources.

  • ACAS/HBSS and applicable security tools section is primarily responsible for monitoring, coordinating, maintaining, and enforcing Cybersecurity policies. The team is also responsible for supporting end-users in troubleshooting their scans results and application access.
  • This position typically responsible for the Information Assurance Vulnerability Management (IAVM) program. Incumbents of this position will regularly exercise discretionary and substantial decision-making authority. Participates in technical research and development to enable continuing innovation within the infrastructure. Ensures that system hardware, operating systems, software systems, and related procedures adhere to the DOD Risk Management Framework.
  • Ensure/enforce compliance of patches by actively scanning for successful/unsuccessful deployments and by preparing reports of compliance. Ensure application servers, and Nessus scanners are compliant with FISMA, AV application IAVM/IAVA/IAVB, AD policies, application CTOs and INFOCONs., etc.
  • Create and manage any required mitigation statements for the exceptions STIGs as needed and perform the period STIG checks as needed.
  • Coordinate with all applicable NETC Enterprise EDTS groups, program managers, and site personnel to initiate corrective actions and help perform some of the testings of new items (GPOs, STIGs, CTOs, and Patches). Performs troubleshooting to isolate and diagnose universal HBSS/ACAS system and application problems; develop support documents and ensure continuous functionality. 

MUST Have Skills:

  • Experience and working knowledge of Security Configuration Compliance (Information Assurance Vulnerability Manager (IAVM/IAV Alert (*AVA)/IAV bulletins, STIG/SCAP)
  • Experience with installation, problem detection, resolution and maintenance on Microsoft (MS) Server 2012, 2008 R2, MS IIS 7.0 and newer, MS Windows 7 and Windows 10, Internet Explorer (IE) 11.0, and Red Hat
  • Working knowledge and experience with HBSS, ACAS, ITSM/Remedy, Serena, and MS Active Directory (AD), Group Policies.
  • Possess strong organizational skills to balance and prioritize work as well as the ability to triage scenarios or bring in additional subject matter experts for problem resolution, as needed.
  • Adhere to Service Management Processes and Procedures (Change, Incident, Problem).
  • Provide customer service to respective customer base and chain of command. Document all work in approved tracking systems. 

Clearance Requirement: TS/SCI

Required Baseline Certs:  CSSP Auditor: CEH, CySA+, CISA, GSNA Computing Environment: ACAS


  • Candidates must be willing and able to attain a CI Polygraph for certain positions as determined by the contract
  • Travel may be required to support the mission 

#DefenseCamp #Belvoirregion #OpportunityOwned #GDITCareers #GDITLife #WeAreGDIT #DPOST #DefenseCampFtBelvoir #GDITINSCOM #I2TS3

We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.