Who We Are:Join the SWRI Security Team as a member of the Information Systems security office. This office provides direction and oversight for a large number of sensitive computer systems, providing guidance of system hardening, data security, and a range of security disciplines required to protect government and client data.
Objectives of this Role: - Conduct certification and accreditation procedures using the DOD Risk Management Framework.
- Understand and interpret the DoD computer security publications to include the DCSA Assessment and Authorization Guide and other such publication.
- Test and validate new hardware and software prior to being authorized on accredited systems and manage the system change requests once items are approved.
- Develop and oversee computer security training program.
- Manage the Information System Security Self inspection program, overseeing sensitive data processing for various divisions.
Daily and Monthly Responsibilities: - Review system accreditations records monthly to verify system expiration dates, contract changes to include updates and extensions.
- Review audit logs weekly and assist division staff with discrepancies, incidents and documentation issues.
- On a daily basis assist division security staff with hardening systems, scanning for vulnerabilities, or validating complaisance settings.
- Review, test and approve or disapprove system change requests.
- Coordinate system accreditation efforts with government certifiers, ensure they understand our timelines and requirements and being able to relay any feedback to SwRI program managers.
Requirements: - Requires an Associates or a Bachelors degree in Computer Security Management, Information Systems, Information Technology or related degree field with relevant experience. Those with an Associates degree will require 10 years of professional level experience.
- 5 years: Windows management, desktop support, system hardening, auditing, and overall ability to administers systems and networks
- 5 years: Utilizing security management tools such as audit reduction tools, SCAP, vulnerability scanning tools and other such security applications.
- 2 years: Conducting in-depth system audits to include being able to interpret MS event codes and being able identify incidents and other anomalies
- 2 years: Submitting systems for review using the Risk Management framework
- A valid/clear driver's license is required.
Special Requirements:Applicant selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Job Locations: San Antonio, TexasMilitary Friendly: Your military experience may apply to this position
For benefits information at our San Antonio location, click here .
For benefits information at all other locations, click here .
An Equal Employment Opportunity Employer: race, color, religion, sex, national origin, disability, and veteran status.