Warnings about cyber threats are everywhere and the constantly evolving nature of these threats can make understanding them to seem overwhelming to government agencies. In all of this “cyber noise”, how can these organizations understand their risks and how to mitigate them? The answer is you – build your knowledge as an information security risk specialist who can help break down complex threats into manageable plans of action.
As an information security risk specialist on our team, you’ll assist Federal government clients with discovering their cyber risks, understanding applicable policies, and analyzing a mitigation plan. You’ll gather technical, environmental, and personnel details from systems engineers, developers, policy and governance staff, system owners, security operations staff, and Information System Security Officers to help with the assessment of the entire threat landscape. You’ll learn how to guide your client through a plan of action with presentations, white papers, and milestones and help to translate security concepts so they can make the best decisions to secure their mission-critical systems. This is your opportunity to build experience in a strategic information security role while developing skills in cybersecurity and a platform to build a career in any or all emerging cybersecurity disciplines, including cloud security, mobile security, critical infrastructure security, secure DevOps, and supply chain security. Join us as we protect the mission-critical infrastructure, systems, and data of our nation’s Federal government. This position will have on-site delivery located in Washington, DC.
Empower change with us.
5+ years of experience with IT security
Experience with Information Assurance Vulnerability Management (IAVM)
Experirence with Key Management Infrastructure (KMI) course
Knowledge of network security and networking technologies and with system, security, and network monitoring tools
Knowledge of database and operating system security, and the latest security principles, techniques, and protocols
Knowledge of secure configuration management and the application of security benchmarks
Ability to facilitate meetings, analyze authorization documents and associated artifacts against authorization requirements to identify gaps, establish a schedule to address outstanding security requirements, and coordinate directly with system team stakeholders
Nice If You Have:
Experience with Supply Chain Risk Management (SCRM)
Experience with KMI and Public Key Infrastructure (PKI)
Knowledge of communications security (COMSEC)
One or more of the following certifications, including Security+, CAP, CISM, CISA, CISSP, CEH, CIPT, or CASP+
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required.
Build Your Career:
Rewarding work, fun challenges, and a ton of investment in our people—that’s Booz Allen cyber. When you join Booz Allen, we’ll help you develop the career you want.
Competitions — From programming competitions at our PyNights (Python competition and learning events) to competing in CTFs, we’ve got plenty of chances for you to show off your skills.
Paid Research — Have an innovative idea to explore or hypothesis to test? You can participate in challenges via our crowdsourcing platform, the Garage, and other programs to be awarded dedicated time and funding to advance your skills.
Cyber University — CyberU has more than 5000 instructor-led and self-paced cyber courses, a free online library that you can access from just about anywhere—including your phone—and certification exam prep guides that include practical assessments to prepare you for your exam.
Academic Partnerships — In addition to our tuition reimbursement benefit, we’ve partnered with University of Maryland University College to offer two graduate certificate programs in cybersecurity—fully funded without a tuition cap.
Maker/Hackerspaces — Race drones, print 3D gadgets, drink coffee from our Wi-Fi coffee maker, and get hands-on training on tools and tech from in-house experts in our dedicated maker and hackerspaces.
We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.