Computing Security & Information Protection

View Job Requisition - Computing Security & Information Protection Specialist 2/3Requisition Number: 11-1018970Job Status: Activated - Posting Type: Posted Internally and Externally. - Posting Status: AvailableLocation Ridley Park, PA Virtual Office/Telecommute?(Things you should know about Virtual Office) Virtual Work Not Available Shift First Business Unit Shared Services Division Security & Fire Protection Program Govt Security Occupation Title Information Technology Skills Management Title Computing Security Job Classification BAUNN2 Note: The level of the classification for a specific applicant will be based on the qualifications of that applicant.Job Type Non-Management Experience Level Career/Experienced Exemption Status Nonexempt Union No Security Clearance Required?(Security Clearance definitions) Current Secret - US Citizenship Required Work Eligibility Required? Yes US Person Status Required? Yes Export Control Required? Yes Relocation Money Available?(Things you should know about relocation benefits) No Date Posted 09/14/2011 Closing Date(Things you should know about closing dates) 09/21/2011 Position Description The successful candidate will rely on their security and Information technology background to evaluate computing and information security risks and develop response plans to mitigate or address identified risks. Develops, tests and implements security solutions and procedures to ensure that systems are compliant with applicable policies, procedures, contracts and regulatory requirements. Analyzes and records computing security events and verifies that security parameters are in place. Provides consultation and advice on computing security issues. Develops policies and oversight to ensure computing infrastructure and applications are protected. Provides compliance and audit support to maintain inspection readiness. Applicant must be very familiar with the Joint Air Force-Army-Navy (JAFAN) and National Industrial Security Program Operating Manual (NISPOM). The candidate must be able to communicate and verify security policy to customers at various levels. Work effectively and cooperatively with fellow employees, peers from other teams and/or parts of the organization and external customers; complete knowledge of verification, validation, certification and qualification processes and procedures, including knowledge of governing regulations and compliance requirements. Ability to assess and document test or analysis data to show compliance; complete knowledge of relevant security documents, procedures, and methodologies. Ability to implement security functionality, develop and write security plans, and oversee security awareness program per the JAFAN/NISPOM guidelines and a working knowledge of Unix and Linux systems; ability in the use of personal computing hardware and software to enter project information, such as, statements of work, resource identification and usage, task status, cost estimating and tracking, etc. Complete knowledge of processes and tools to maintain, archive, sanitize, and retrieve digital files. Complete ability in constructing/building and providing reports and presentation material as needed for assigned projects. Complete knowledge of identifying and gaining approval of testing of established applications to meet project requirements. The successful candidate for this position will perform information systems security support for Boeing Programs and ensure compliance with government and company requirements.Competencies General[ + ] CommunicationGenerally clarifies purpose and importance; stresses major points; follows a logical sequence. Usually keeps the audience engaged through use of techniques such as analogies, illustrations, humor, an appealing style, body language, and voice inflection. Frames the message in line with audience experience, background, and expectations; uses terms, examples, and analogies that are meaningful to the audience. Generally seeks input from audience; checks understanding; presents message in different ways to enhance understanding. Uses syntax, pace, volume, diction, and mechanics appropriate to the media being used. Accurately interprets messages from others and responds appropriately.[ + ] Planning And OrganizingIdentifies more critical and less critical activities and assignments; adjusts priorities when appropriate. Determines project or assignment requirements by breaking them down into tasks and identifying types of equipment, materials, and people needed. Allocates appropriate amounts of time for completing own work; avoids scheduling conflicts. Takes advantage of available resources (individuals, processes, departments, and tools) to complete work efficiently; coordinates with internal and external partners. Uses time effectively and prevents irrelevant issues or distractions from interfering with work completion.Technical[ + ] Analytical SkillsBasic -Skill and ability to: collect, organize, synthesize, and analyze data; summarize findings; develop conclusions and recommendations from appropriate data sources at the work group level.Preferred -Skill and ability to: collect, organize, synthesize, and analyze data; summarize findings; develop conclusions and recommendations from appropriate data sources at the department level.[ + ] Certification & QualificationBasic -General knowledge of verification, validation, certification and qualification processes and procedures, including knowledge of governing regulations and compliance requirements. General ability to assess and document test or analysis data to show compliance.Preferred -Complete knowledge of verification, validation, certification and qualification processes and procedures, including knowledge of governing regulations and compliance requirements. Ability to assess and document test or analysis data to show compliance.[ + ] Customer KnowledgeBasic -General knowledge of techniques to help identify a customer\'s organization, capabilities, practices, support resources, preferences, problems, and other constraints in order to provide effective product support and technical issue resolution.Preferred -Complete knowledge of techniques to help identify a customer\'s organization, capabilities, practices, support resources, preferences, problems, and other constraints in order to provide effective product support and technical issue resolution.[ + ] Information AssuranceBasic -General knowledge of principles, concepts, practices, processes, tools and methodologies to assure confidentiality, integrity and availability of information and information systems. Understands current industry standard common body of knowledge (CBK) and common criteria methodology (CCM).Preferred -Complete knowledge of principles, concepts, practices, processes, tools and methodologies to assure confidentiality, integrity and availability of information and information systems. Understands current industry standard common body of knowledge (CBK) and common criteria methodology (CCM).[ + ] Information ProtectionBasic -General knowledge of the security of architecture, electronic data communications, network/data, electronic commerce, electronic commerce, and other related areas to provide computing security and integration services to company computer users and customers. Interfaces with the appropriate government agencies, customers, suppliers, and company personnel in order to facilitate implementation of protective mechanisms and to ensure understanding of and compliance with computing security requirements.Preferred -Complete knowledge of the security of architecture, electronic data communications, network/data, electronic commerce, and other related areas to provide computing security and integration services to company computer users and customers. Interfaces with the appropriate government agencies, customers, suppliers, and company personnel in order to facilitate implementation of protective mechanisms and to ensure understanding of and compliance with computing security requirements.[ + ] Information Technology FluencyBasic -General ability in the use of personal computing hardware and software to enter project information, such as, task status, cost estimating, and tracking. General knowledge of processes and tools to maintain, archive, and retrieve digital files. General knowledge of constructing/building reports and presentation materials as needed for assigned projects or in support of higher-level project leads on large projects.Preferred -Complete ability in the use of personal computing hardware and software to enter project information, such as, statements of work, resource identification and usage, task status, cost estimating and tracking, etc. Complete knowledge of processes and tools to maintain, archive, and retrieve digital files. Complete ability in constructing/building and providing reports and presentation material as needed for assigned projects. Complete knowledge of identifying and gaining approval of testing of established applications to meet project requirements.[ + ] Security Markings & ProceduresBasic -General knowledge of relevant security documents, procedures, and methodologies.Preferred -Complete knowledge of relevant security documents, procedures, and methodologies. Ability to implement security functionality, develop and write security plans, and oversee security awareness program.Basic Qualifications For Consideration Do you have experience supporting Department of Defense programs?Do you have experience in the computing security field?Typical Education/Experience Level 2 - Technical bachelor\'s degree and typically 2 or more years\' related work experience or a Master\'s degree or an equivalent combination of education and experience. A technical degree is defined as any four year degree, or greater, in a mathematic, scientific or information technology field of study.Level 3 - Technical bachelor\'s degree and typically 5 or more years\' related work experience or a Master\'s degree with typically 3 or more years\' or a PhD degree or an equivalent combination of education and experience. A technical degree is defined as any four year degree, or greater, in a mathematic, scientific or information technology field of study. Other Job related information Position requires Current secret clearance- US Citizenship Required - Applicants MUST include their Security Clearance Level clearly on their resume. *** Please note that depending on the specific position, you may be required to pass additional medical tests, credit checks, and/or other requirements. These additional items are required for the Company to comply with various laws and regulatory rules.***Every job requisition has specific and unique requirements listed under \'Description\', \'Competencies\', and \'Education\'. Applicants will increase their opportunities for consideration by demonstrating compatibility with these requirements in their resumes.The job specifications - including competencies (knowledge, skills, abilities, and other characteristics), job-relevant work experience, education, and other requirements described in this requisition - will be the basis for applicant screening, including resume reviews, structured interviews and any other assessments used to support the hiring decision. All candidates considered for this position may be required to participate in a structured interview. The structured interview is a standardized method of evaluating candidates\' job-related competencies to support an objective selection and promotion process.


Similar Ads

Administrative assistant\receptionist – hartford¸ ct

C4i program manager

Performance reporting manager – hospital services

Computer operator iv – san diego¸ ca

Training manager nc51447781

Project leader i

It manager–hospital services

General clerk iii nc51444357

Mid level sql database administrator nc51365326