Search for More Jobs
Get alerts for jobs like this Get jobs like this tweeted to you
Company: SPA
Location: Huntsville, AL
Career Level: Associate
Industries: Manufacturing, Engineering, Aerospace

Description

Qualifications

Required Qualifications:

  • BA/BS with 5+ years of experience or AA with 7+ years of experience
  • IAT II Certification
  • Experience with Active Directory
  • Ability to interpret and apply DOD and Army level cyber instructions and regulations
  • Familiarity with domain structures, user authentication, and digital signatures
  • Active Secret Clearance and the ability to maintain it throughout employment

Desired Qualifications: 

  • Experience with Army Access Control procedures
  • Professional experience with Identity and Access Management
  • Basic understanding of software assurance requirements in DoD


Responsibilities

Under general supervision, the individual performs all procedures necessary to ensure the safety of information systems assets and to protect systems from both intentional and inadvertent access or destruction. Responsibilities include evaluating and verifying access requests, accurately assessing the level of security required, creating new identity records in the identity database, and performing appropriate edits and deletions to existing records. The individual also monitors, manages, and reports Access Management activities through the Army Account Validation System (AVS) and other program-specific means. Additionally, they ensure that the user community understands and adheres to the necessary procedures and training required to maintain security. The role supports Risk Management Framework (RMF) compliance through the development of authorization and accreditation documentation and the use of eMASS. The individual utilizes required cybersecurity tools within Department of Defense (DoD) architectures to achieve and maintain compliance. Furthermore, they apply knowledge of information assurance policies and procedures to implement secure networking, computing, and enclave environments, along with performing other cyber-related duties as assigned.


 Apply on company website