JOB DESCRIPTION: This sub family is responsible for maintaining computer and information security incident, damage and threat assessment programs. Duties include investigating computer and information security incidents to determine extent of compromise to information and automated information systems, providing computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments, researching and maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption. In addition, duties may include designing, developing or recommending integrated system solutions ensuring proprietary/confidential data and systems are protected, participating with the client in the strategic design process to translate security and business requirements into technical designs, and configuring and validating secure systems, testing security products/systems to detect computer and information security weakness. IMPACT: Leads the team in developing new products, processes, standards or operational plans in support of the project/family. Has budget accountability for work area or manage elements of the budget. COMPLEXITY: Problems and issues faced are complex and require information gathering and analysis to understand the problem. Problems are difficult and complex and typically involve multiple small projects, families or customers. COMMUNICATION: Communicates with parties within and outside of own area, which may include external constituents depending upon the area. Requires ability to influence others outside of own area on policies, practices and procedures. LEADERSHIP amp; TALENT MANAGEMENT: Manages a large team of experienced professionals who exercise latitude and independence in their assignments. Leads, directs and reviews the work of team who exercise latitude and independence in their assignments. Typically has hiring, firing, promotion and reward authority within own area, in accordance with manager review and approval. KNOWLEDGE: Requires broad management and leadership knowledge to lead project or program teams in one family. Typically has advanced knowledge and skills within a specific technical or professional discipline with broad understanding of other areas within the function. TYPICAL EDUCATION amp; EXPERIENCE: Typically requires a BA/BS or equivalent experience and 8+ years of prior relevant experience or Masters with 6+ years of prior relevant experience. Generally has 4+ years of experience supervising or leading teams or projects. EFFECTIVE DATE: 07/02/2016
EDUCATION Must hold an appropriate degree from an accredited college, or equivalent experience/combined education, with professional experience and specialized training commensurate with assignment. B.S. in Cyber Security, Information Technology, Information Assurance and Security or a related degree M.S. Computer Science, Information Technology, Cyber security - Computer Forensics, Technical Information Management Cyber Security or a related degree Experience developing compliance policy/procedures with all local and site applicable security regulations and procedures to avoid disclosing sensitive information, computer systems and data, privacy act data, and Government personnel work products. Experience presenting formal project status/plan briefings to the Government managers and Executives through oral and written communications. Required Certifications: CISSP - Certified Information Systems Security Professional (minimum IASEA Level II) and CISA - Certified Information Systems Auditor or CPTE Certified Penetration Testing Engineer Security Requirements: Must be able to pass the National Agency Check with written Inquiries (NACI), National Trust, and a favorable completion of a Federal Bureau of Investigation (FBI) fingerprint check, or a DoD/DoE-determined equivalent investigation, or greater. Must hold a Secret or Top Secret security clearance with a single scope background investigation (SSBI) at contract start Desired Certifications: CRISC - Certified in Risk and Information Systems Control CISM - Certified Information Security Manager Information Technology Infrastructure Library (ITIL)v3 Foundation Project Management Professional (PMP ) Education: B.S. in Cyber Security, Information Technology, Information Assurance and Security or a related degree M.S. Computer Science, Information Technology, Cyber security - Computer Forensics, Technical Information Management Cyber Security or a related degree Appropriate degree from an accredited college, or equivalent experience/combined education, with professional experience and specialized training commensurate with assignment.
Leidos is a global science and technology solutions leader working to solve the world's toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company's 33,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported pro forma annual revenues of approximately $10 billion for the fiscal year ended January 1, 2016 after giving effect to the recently completed combination of Leidos with Lockheed Martin's Information Systems Global Solutions business (IS GS). For more information, visit www.Leidos.com. The company's diverse employees support vital missions for government and commercial customers. Qualified women, minorities, individuals with disabilities and protected veterans are encouraged to apply. Leidos is an Equal Opportunity Employer.
JBLeidos ICBJMETA ICGP400