Navy - Information Systems Security Analyst - Secret Clearance Required
Job in
Dahlgren, King George County, Virginia, 22448, USA
Listed on 2026-01-12
Listing for:
cFocus Software Incorporated
Full Time
position Listed on 2026-01-12
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, Data Security, IT Consultant
Job Description & How to Apply Below
cFocus Software seeks an Information Systems Security Analyst to join our program supporting the Department of Defense (DoD). This position is remote. This position requires the ability to obtain a Secret clearance.
Qualifications- B.S. Computer Science, Information Technology, or a related field
- 4+ years of Cybersecurity experience
- Cybersecurity Expertise to include:
- Cybersecurity principles, threats, vulnerabilities, and risk management processes
- Encryption algorithms (e.g., Internet Protocol Security (IPSEC), Advanced Encryption Standard (AES), General Routing Encapsulation (GRE), Internet Key Exchange (IKE), Message Digest 5 (MD5), Secure Hash Algorithm (SHA), Triple Data Encryption Algorithm (3
DES)) - Data backup and recovery concepts and tools
- Disaster recovery and continuity of operations planning
- Host/network access control mechanisms (e.g., Access Control Lists (ACLs))
- Incident response and handling methodologies
- Intrusion detection methodologies and techniques
- Network traffic analysis methods
- Network protocols (Transmission Control Protocol /Internet Protocol (TCP/IP), and Open System Interconnection (OSI) model)
- System and application security threats and vulnerabilities (e.g., buffer overflow, cross-site scripting, SQL injection)
- Security architecture concepts and enterprise architecture reference models
- National and international cybersecurity laws, regulations, policies, and ethics
- Current and emerging threats and threat vectors
- Enterprise incident response program, roles, and responsibilities
- Penetration testing principles, tools, and techniques
- Computer networking concepts, protocols, and security methodologies
- System performance and availability monitoring
- System software and organizational design standards (e.g., International Organization of Standardization (ISO) guidelines)
- System life cycle management principles, including software security and usability
- System/server administration and systems engineering concepts and methods
- Server and client operating systems
- Network security architecture concepts (topology, protocols, defense‑in‑depth)
- Network systems management principles and tools
- Basic system administration, network, and operating system hardening techniques
- Cloud computing service and deployment models (SaaS, IaaS, PaaS)
- Cloud security strategy and architecture
- Data security standards Personally Identifiable Information (PII), Payment Card Information (PCI), Protected Health Information (PHI)
- Information security program management and project management principles
- Resource management principles and techniques
- Risk management processes (assessment and mitigation)
- Secure acquisitions (e.g., Contracting duties, secure procurement, supply chain risk management)
- Information technology (IT) supply chain security and risk management
- Applicable laws, statutes, Presidential Directives, and guidelines related to cybersecurity and privacy
- Organizational risk tolerance and risk management approach
- Critical IT procurement requirements
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×