More jobs:
Information Security Specialist III Security Clearance
Job in
Fort Hood, Bell County, Texas, 76544, USA
Listed on 2026-02-27
Listing for:
Galapagos Federal Systems LLC
Full Time
position Listed on 2026-02-27
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, Network Security
Job Description & How to Apply Below
Location: Fort Hood
Overview
Job Summary Kai Honua, LLC has an immediate opening for an Information Security Specialist to join our rapidly growing team. The Information Security Specialist performs under general direction and uses current information security technology disciplines and practices to ensure the confidentiality, integrity and availability of Government information assets in accordance with established standards and procedures. Essential Responsibilities and Duties (Not listed in order of importance;
other duties may be assigned) and must be able to perform the following with minimal guidance:
• Provide oversight for the Computer Network Defense-Service Provider (CNDSP)
• Work with system owners to close IAVMs/ICVMs and open Plan of Action and Milestones (POA&Ms) in a rapid fashion, in accordance with DoD instructions/directives. Review all POA&MS with the Program Manager on at least a quarterly basis and update the POA&Ms accordingly.
• Provide Defense in Depth principles and technology in security engineering designs and implementation
• Analyze existing and future systems, reviewing security architectures, and developing engineering solutions that integrate information security requirements to proactively manage information protection
• Apply security risk assessment methodology to system development, including assessing and auditing network penetration testing, antivirus deployment, risk analysis
• Conduct Computer Incident Response Team (CIRT) activities, including forensic analysis
• Engineer and deploy network defense countermeasures such as anti-virus, anti-spam, and intrusion detection and prevention system solutions
• Analyze IA security events, including threat model development and resulting security risk analysis of systems
• Review and assess information security events and logs via sophisticated security information/event manager
• Plan, implement, and manage a Defense In Depth for the total network and/or enclaves within the network to include such items as: scanning, remediation, host and network intrusion detection/prevention, firewalls, proxy servers, web cache, virus programs, vulnerability scanning, content filtering, remote dial in protection, Host Based Security Services, Directory Services, and Certification and Accreditation, DoD Instruction 5200.40, accreditation guidance and advice IAW AR 25-2 and IA Best Business Practices (BBPs).
Plan, respond, investigate, and report undisclosed classified incident remediation.
• Assess and mitigate system security threats/risks throughout the program life cycle
• Validate system security requirements definition and analysis and review/approve System Security Plans for enterprise-wide architectures
• Maintain Agency public key infrastructure system Implement security designs in hardware, software, data and procedures
• Provide support for the Department of Defense (DoD) Public Key Infrastructure (PKI) service.
• Responsible for requesting, receiving, installation, and accountability of system (server) PKI certificates and providing technical support for PKI.
• Provide Certification and Accreditation, as well as provide Automated Information System Accreditation support
• Provide Security Risk Assessment. Perform risk analysis of resources, controls, vulnerabilities, impact of losing systems' capabilities and threats to the mission objective; provide analysis to facilitate decisions to implement security countermeasures or mitigate risk; implement countermeasures; periodically review program. Recognize possible threats and review evaluations for compliance and non-compliance.
• Develop and maintains knowledgebase on changing regulatory, threat, and technology landscapes to continually develop or maintain security policies and standards, and ensures compliance throughout the organization
• Provide Risk Management Framework, circuit/system accreditation and certification policy services
• Participate in the development or modification of the computer environment IA security program plans and requirements
• Develop procedures to ensure system users are aware of their IA responsibilities before granting access to DoD information systems
• Recognize…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×