Role: Applications Systems Analyst – Intermediate
Location: Fort Knox, KY OR Remote
Education/Certifications: BA/BS or MA/MS preferred; IAT Level II; Computing Environment Certification
Years of Experience: 5+
Clearance Level & Investigation: Secret
IA Cert Level (DoD 8570.01): IAT Level II (Security+ or SSCP recommended)
Computing Environment Certifications: Required
Job Description:
Qualifications:
- Formulates and defines system scope and objectives through research and fact-finding to develop or modify moderately complex information systems.
- Prepares detailed specifications from which programs will be written.
- Analyzes and revises existing system logic difficulties and documentation as necessary.
- Competent to work on most phases of applications systems analysis activities, but requires instruction and guidance in other phases.
- May use CASE tools.
Specific Responsibilities:
- Perform enterprise-wide risk analysis and vulnerability assessments to assess the command security posture.
- Coordinate and develop recommendations on Cybersecurity incident response, mitigation, remediation actions, or risk determination for the purpose of protecting command ISs from damage, destruction, or alteration IAW all required regulations and directives.
- Perform scans of all static code across all systems and applications with the Government approved tool to comply with statutory and regulatory requirements supporting boundary authorizations IAW RMF and deliver recommendations and reports as required.
- Provide recommendations and perform logging, correlation, and scanning with provided Government and Cybersecurity tools (Assured Compliance Assessment Solution (ACAS) and Army Endpoint Security System (AESS)).
- Analyze and correlate risk impact and compliance across all systems, applications, and authorization boundaries.
- Provides surge support, technical guidance, and expertise in the areas of Cybersecurity to support Customer, Mission Partners, IMOs, ISSOs, IS Owners, Software Developers, Network System, and Database Administrators IAW all related cyber regulations and directives; provide results in reports, briefs, and deliverables as required to the appropriate Government representative.
- Provide Cybersecurity surge support in the event of real world or additional requirements in support of RMF compliance checks and documentation review across authorization boundaries, including, but not limited to:
- Perform security review preparation for all security controls associated with RMF applicable to an assigned authorization boundary based upon the Confidentiality, Integrity, or Availability designation.
- Perform on site or off-site reviews of all information systems to audit and validate compliance with associated security controls.
- Perform as reviewers of audit teams during inspections, assessments, evaluations, audits, etc.
- Provide reports to the assigned Government representative as required.
- Provide reviews, validation, and deliverable efforts in support of compliance or non-compliance IAW CCI, STIGs and SRGs for each finding or vulnerability IAW RMF.
- Provide embedded Cybersecurity support across Customer or other supported organizations as required.