CACI serves the U.S. government to include the uniformed services, veterans, and citizens by accelerating the transformation of healthcare through the application of new healthcare strategies and technology. We provide transformational functional subject matter expertise and health IT services to the Department of Veterans Affairs, Department of Defense Military Health System, and the Department of Health and Human Services, including the Centers for Disease Control and Prevention, the National Institutes of Health, the Centers for Medicare & Medicaid Services, and the Federal Drug Administration. Our healthcare professionals bring in-depth, first-hand understanding of both practitioners' and patients' needs to every project, always keeping the focus on solutions and services to support the delivery of efficient and effective patient care. From on-site medical logistics, facility management, and business process re-engineering to the development of patient information sharing, electronic medical records integration, and information assurance, we focus on the patient, ensuring that systems and processes at the backbone of health organizations are running efficiently.
With a wide range of knowledge, performs independent assessment of the information security posture of an organization using applicable tools. Assesses information network threats such as computer viruses. Operates vulnerability assessment equipment in support of penetration analyses. Provides guidance to less experienced information security professionals. Supports maintenance of ATO by supporting and managing timelines for remediation of POAM findings. Prepares evaluation reports. Recommends remedial actions for Vulnerabilities.
Monitors security systems, and analyzes potential threats and vulnerabilities to client systems.
Develops new computer and network security systems, including both hardware and software.
Coordinates technical incident response and remediation activities for client environments.
Provides security analysis and consultation services for product, system and network architecture designs.
Develops tools for operational use and analyzes current threats to information security and systems.
Analyzes network traffic and alerts to assess, prioritize and differentiate between potential intrusion attempts and false alarms.
Launches and tracks investigations to resolution.
Composes and sends alert notifications.
Analyzes security findings and data.
Publishes reports and keeps metrics for client systems.
Identifies trends and root causes of system failures or vulnerabilities.
Maintains vendor and trusted partner relationships.
Ensures that the Information Systems Security department's policies, procedures, and practices as well as other systems user groups are in compliance.
Ensures that the physical environment of the computers and their terminals are properly secured.
EDUCATION & EXPERIENCE:
Typically requires a bachelor's degree or equivalent and five to seven years of related experience.
DoD 8570.01M IAM I required, IAM II,III preferred
Normal demands associated with an office environment. Ability to work on computer for long periods, and communicate with individuals by telephone, email and face to face.