Information System Security Analyst

All levels of Information System Security Analyst will have the skills listed below. Each level may have additional education, skill and/or experience requirements.

The Information System Security Analyst applies current technologies to the design, development, evaluation and integration of computer information systems and networks to maintain system security. May work with commercial computer product vendors in the design and evaluation of state-of-the-art secure COTS applications, operating systems, networks and database products and technology. Provides security engineering and integration services to internal customers. Involved in a wide range of issues including secure architectures, secure electronic data traffic, network security, information security and privacy. Uses encryption technology, penetration, risk management and vulnerability analysis of various security technologies and information technology security research. Develops security systems for any manual or automated systems environments. Responsible for ensuring the protection of company data against unauthorized disclosure, accidental or intentional loss of data, or unauthorized modification. May prepare security reports. Minimum Education and Experience Bachelor’s Degree or equivalent experience Required Skills and Education

Required Education:

Bachelors and 0+ year(s) related experience

Required Experience:

Bachelor’s degree in Computer Science, Information Systems or similar degree or equivalent experience

Required Skills:

  • Active security clearance required. • U.S. Citizenship required. • Maintain operational security posture for the program to ensure information systems security policies, standards, and procedures are established and followed. • Assist with the management of security aspects of the information system and performs day-to-day security operations of the system. • Evaluate security solutions to ensure they meet security requirements for processing classified information. • Perform vulnerability/risk assessment analysis to support certification and accreditation. • Provides configuration management (CM) for information system security software, hardware, and firmware. • Manage changes to system and assesses the security impact of those changes. • Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, etc. • Experience and/or familiarity with Certification and Accreditation (C&A). • Experience and/or familiarity with the following network protection devices: Firewalls, intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis • Experience and/or familiarity with Secure Technical Implementation Guides (STIGs), Information Assurance Vulnerability Alert (IAVA), DCID 6/3, Federal Information Security Management Act (FISMA) and other tools using industry best practices. • DoD 8570.1-M Compliance at IAT Level I or equivalency (e.g., Certified Information Systems Security Professional (CISSP)) certification required Preferred Skills and Education dl{margin:0 0 .8em}dt{font-weight:bold}dd{margin:.4em 0 0 2em}

Preferred Skills:

  • Experience or familiarity with Agile development methodology. About BAE Systems Intelligence & Security BAE Systems Intelligence & Security, based in McLean, Virginia, designs and delivers advanced defense, intelligence, and security solutions that support the important missions of our customers. Our pride and dedication shows in everything we do—from intelligence analysis, cyber operations and IT expertise to systems development, systems integration, and operations and maintenance services. Knowing that our work enables the U.S. military and government to recognize, manage and defeat threats inspires us to push ourselves and our technologies to new levels. That’s BAE Systems. That’s Inspired Work.

Equal Opportunity Employer/Females/Minorities/Veterans/Disabled/Sexual Orientation/Gender Identity/Gender Expression. To see Inspired Work in action, visit www.baesystems.com and follow us on Facebook: www.facebook.com/baesystemsintel. EEO Career Site Equal Opportunity Employer. Minorities . females . veterans . individuals with disabilities . sexual orientation . gender identity . gender expression

Back to top