CACI serves the U.S. government to include the uniformed services, veterans, and citizens by accelerating the transformation of healthcare through the application of new healthcare strategies and technology. We provide transformational functional subject matter expertise and health IT services to the Department of Veterans Affairs, Department of Defense Military Health System, and the Department of Health and Human Services, including the Centers for Disease Control and Prevention, the National Institutes of Health, the Centers for Medicare & Medicaid Services, and the Federal Drug Administration. Our healthcare professionals bring in-depth, first-hand understanding of both practitioners' and patients' needs to every project, always keeping the focus on solutions and services to support the delivery of efficient and effective patient care. From on-site medical logistics, facility management, and business process re-engineering to the development of patient information sharing, electronic medical records integration, and information assurance, we focus on the patient, ensuring that systems and processes at the backbone of health organizations are running efficiently.
Under general supervision, performs information system administration, using knowledge and experience with information network software and hardware. Assesses information network threats such as computer viruses. Operates vulnerability assessment equipment in support of penetration analyses.
Monitors security systems, and analyzes potential threats and vulnerabilities to client systems. Helps develop new computer and network security systems, including both hardware and software. Assists in development and implementation of technical security policies. Coordinates technical incident response and remediation activities for client environments. Provides security analysis and consultation services for product, system and network architecture designs. Analyzes network traffic and alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms. Participates in investigations to resolution and tracks solutions. Issues user ID's and passwords to new users and monitors system access and use to identify any security violations. Composes and sends alert notifications. Analyzes basic security findings and data. Identifies trends and root causes of system failures or vulnerabilities. Works to establish vendor and trusted partner relationships.
EDUCATION & EXPERIENCE:
Typically requires a bachelor's degree or equivalent and two to four years of related experience.
Normal demands associated with an office environment. Ability to work on computer for long periods, and communicate with individuals by telephone, email and face to face. Some travel may be required.