If you are looking for an opportunity to advance your career and collaborate with experts in the IT industry, The Lone Wolf program offers dependable, secure, and high-quality VVD services to senior leaders within the DOD. Our team is dedicated to maintaining a high level of professionalism, managing risk, improving operations and maintenance, ensuring exceptional IT service quality, and preparing for future challenges. With primary operating locations in Warrenton, VA, San Antonio, TX and Colorado Springs, CO, the Lone Wolf program supports users around the globe.
Candidates are expected to have a strong work ethic and possess the ability to work as a critical member of a team in pursuit of mission objectives and in support of our customers. We value candidates who are detail-oriented while also being able to think and react quickly to emerging and unique problem sets. To be successful in this role, you'll be able to rapidly adapt and learn how to operate the front and back end of new products and processes.
Responsibilities:
Provide technical/management leadership on major tasks or technology assignments and establish goals and plans that meet project objectives.
Evaluate and implement cybersecurity tools for assessing and maintaining system security within the Defense Information Infrastructure (DII).
Implement DoD network compliance validation and inspection procedures.
Analyze general cybersecurity-related technical problems and provide basic engineering and technical support in solving these problems.
Perform vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle.
Develop standardized certification and accreditation processes in accordance with DII RMF policy and maintain established accreditation baselines.
Ensure establishment and satisfaction of cybersecurity and security requirements based on analysis of user, policy, regulatory, and resource demands.
#divergent
Must have active Top Secret clearance with SCI eligibility
At least 10 years of relevant experience
8570 IAT 2 certification required
Has domain and expert cybersecurity technical knowledge as well as knowledge of connection security approval processes and compliance policies
Skilled in performing analyses to ensure threat assessments, protection, detection, and reaction functions are performed.
Possess excellent verbal and written communication skills
Preferred:
Experience in directing and controlling activities for a client, having overall responsibility for financial management, methods, and staffing to ensure that technical requirements are met
Supervisory experience