Posted in

Mid Security Configuration Management Analyst

Mid Security Configuration Management Analyst

CompanyGuidehouse
LocationArlington, VA, USA
Salary$Not Provided – $Not Provided
TypeFull-Time
DegreesBachelor’s
Experience LevelMid Level

Requirements

  • An ACTIVE and MAINTAINED SECRET federal security clearance
  • Bachelor’s degree; OR FOUR (4) years’ experience related to cybersecurity, information assurance, information technology and/or IT Technology Consulting may be used in lieu of a bachelor’s degree
  • FOUR (4) or more years’ experience as a Security/Network Administrator or Cybersecurity professional
  • The ability to obtain a DOD 8570 Level 1 certification within 6 months of employment, if not already obtained.

Responsibilities

  • Supporting and controlling secure configurations of over 200 information systems for a federal client
  • Ensuring information security configuration management requirements are integrated into existing organizational configuration management processes
  • Identification and recording of configurations that impact the security posture of the system and the organization
  • The consideration of security risks in approving the initial configuration
  • The analysis of security implications of changes to the system configuration
  • Documentation of the approved/implemented changes
  • Qualitative and quantitative research to support work assignments for meeting the deliverable objective
  • Qualitative and quantitative analyses for assigned tasks
  • Compilation of research, findings, and other information into written formats such as white papers, reports, presentations, and other forms of technical documentation
  • Participation in policy development for configuration management
  • Configuration management planning and management
  • Configuration identification
  • Configuration management and IT security audits.

Preferred Qualifications

  • Current DOD 8570 Level 1 certification
  • Broad knowledge of cybersecurity threats
  • Broad knowledge of information system technologies
  • Experience developing security policy
  • Experience with online research techniques