General Dynamics Information Technology
Senior Information Assurance Security Engineer (Tactical Networks - CANES) | Act
General Dynamics Information Technology, San Diego, California, United States, 92189
Overview
Transform technology into opportunity as a
Senior
Information Assurance (IA) Security Engineer
with GDIT. A career in Security Engineering means connecting and hardening the systems that matter most. At GDIT you’ll be at the forefront of innovation—advancing Consolidated Afloat Networks and Enterprise Services (CANES) and related Navy tactical network capabilities for NIWC Pacific (Codes 55131/55132/55133) in support of PMW-160 Tactical Networks. At GDIT, people are our differentiator. Our work depends on a Senior IA Security Engineer who can lead
Risk Management Framework (RMF)
Authorization & Accreditation (A&A), harden virtualized/cloud network stacks, and drive compliance across ashore, afloat, subsurface, airborne, mobile, and joint environments.
Responsibilities
Lead end-to-end
RMF
for CANES baselines; develop
IATT/ATO
packages in
eMASS ; maintain
SSP, SAP/SAR, POA&M, CONMON , IR/CM/CP/MA policies, and PPSM artifacts.
Engineer secure architectures for
virtualized
(e.g., VMware/ESXi/NSX),
cloud/hosting ,
GPON ,
wireless , and mission transport; apply
DISA STIGs ,
ACAS / SCAP
scanning, IAVM remediation, and continuous monitoring.
Provide IA guidance for
application integration
on CANES; align with
DoDAF ,
NESI/DISR ,
Net-Ready KPP , and program technical baselines.
Support
Developmental Test & Evaluation (DT&E) ,
TRRs , CCRI prep, and audit response; capture findings and remediation to preserve ATO conditions.
Coordinate with
PEO C4I/PMW-160 , NIWC Pacific engineers, and Fleet stakeholders; brief risks, mitigation, and compliance status to IPTs/WIPTs and CCB/PTRB venues.
Integrate with
Configuration Management
(e.g., CMPro) ensuring cyber posture is tied to approved hardware/software baselines.
Mentor junior engineers; champion
DevSecOps
practices and STIG automation (e.g., Ansible) to accelerate secure deployments.
What you’ll need to succeed (Required):
Security Clearance:
Active Secret clearance.
Experience:
10+ years IA/cybersecurity engineering for enterprise or tactical networks, including RMF A&A and eMASS package development.
8+ years applying DISA SRGs/STIGs, ACAS/NESSUS, SCAP, vulnerability management, and IAVM compliance; authoring SAP/SAR and managing POA&Ms.
5+ years securing virtualized environments (Windows/Linux hardening, AD/GPO, ESXi/NSX or comparable), and implementing enclave boundary protections (firewalls, IDS/IPS, TACLANE/VPN).
Demonstrated support to Navy tactical networks (e.g., CANES-like programs), network operations, and assessment activities (TRR/DT/OT/CCRI).
Certifications
(DoD 8140/8570): IAT-III or IAM-III baseline (e.g., CISSP, CASP+, CISM); ability to obtain platform/tool-specific certs as assigned.
Education:
BS/BA in Cybersecurity, Computer Science, Information Systems, Engineering, or related field. Equivalent experience may substitute per GDIT policy.
Education:
BS/BA in Electrical/Computer/Systems Engineering, Computer Science, Information Technology, or related field; equivalent military training/experience considered.
Work Location:
Onsite NIWC Pacific, San Diego, CA (labs/shipyards/fleet concentration areas). Limited CONUS/OCONUS travel as tasking requires; ability to work in classified labs and onboard ships/submarines/airborne ground sites.
Position Availability:
Position is pending final contract award.
US Citizenship Required
What we’d love for you to have (Desired):
Prior support to
PMW-160 / NIWC Pacific
tactical networks; familiarity with
CANES ,
ADNS , or similar Navy programs.
Hands-on with
VMware
(VCP),
Red Hat
(RHCSA/RHCE),
Cisco
(CCNP Security),
Splunk/ELK ,
Kubernetes/containers , and STIG automation.
Experience with
GPON , QoS, wireless enclave security, SATCOM transport, and cross-domain/guard solutions.
Direct participation in
CCRI
events, DTO/OT&E, and audit remediation.
Knowledge of
COMSEC/CMS , TEMPEST coordination, and Navy cybersecurity policy implementation across multi-domain enclaves.
GDIT is your place GDIT IS YOUR PLACE
At GDIT, the mission is our purpose, and our people are at the center of everything we do.
Growth:
AI-powered career tool that identifies career steps and learning opportunities
Support:
An internal mobility team focused on helping you achieve your career goals
Rewards:
Comprehensive benefits and wellness packages, 401K with company match, and competitive pay and paid time off
Flexibility:
Full-flex work week to own your priorities at work and at home
Community:
Award-winning culture of innovation and a military-friendly workplace
Own your opportunity Explore a career at GDIT and you’ll find endless opportunities to grow alongside colleagues who share your ambition to deliver your best work.
#J-18808-Ljbffr
Transform technology into opportunity as a
Senior
Information Assurance (IA) Security Engineer
with GDIT. A career in Security Engineering means connecting and hardening the systems that matter most. At GDIT you’ll be at the forefront of innovation—advancing Consolidated Afloat Networks and Enterprise Services (CANES) and related Navy tactical network capabilities for NIWC Pacific (Codes 55131/55132/55133) in support of PMW-160 Tactical Networks. At GDIT, people are our differentiator. Our work depends on a Senior IA Security Engineer who can lead
Risk Management Framework (RMF)
Authorization & Accreditation (A&A), harden virtualized/cloud network stacks, and drive compliance across ashore, afloat, subsurface, airborne, mobile, and joint environments.
Responsibilities
Lead end-to-end
RMF
for CANES baselines; develop
IATT/ATO
packages in
eMASS ; maintain
SSP, SAP/SAR, POA&M, CONMON , IR/CM/CP/MA policies, and PPSM artifacts.
Engineer secure architectures for
virtualized
(e.g., VMware/ESXi/NSX),
cloud/hosting ,
GPON ,
wireless , and mission transport; apply
DISA STIGs ,
ACAS / SCAP
scanning, IAVM remediation, and continuous monitoring.
Provide IA guidance for
application integration
on CANES; align with
DoDAF ,
NESI/DISR ,
Net-Ready KPP , and program technical baselines.
Support
Developmental Test & Evaluation (DT&E) ,
TRRs , CCRI prep, and audit response; capture findings and remediation to preserve ATO conditions.
Coordinate with
PEO C4I/PMW-160 , NIWC Pacific engineers, and Fleet stakeholders; brief risks, mitigation, and compliance status to IPTs/WIPTs and CCB/PTRB venues.
Integrate with
Configuration Management
(e.g., CMPro) ensuring cyber posture is tied to approved hardware/software baselines.
Mentor junior engineers; champion
DevSecOps
practices and STIG automation (e.g., Ansible) to accelerate secure deployments.
What you’ll need to succeed (Required):
Security Clearance:
Active Secret clearance.
Experience:
10+ years IA/cybersecurity engineering for enterprise or tactical networks, including RMF A&A and eMASS package development.
8+ years applying DISA SRGs/STIGs, ACAS/NESSUS, SCAP, vulnerability management, and IAVM compliance; authoring SAP/SAR and managing POA&Ms.
5+ years securing virtualized environments (Windows/Linux hardening, AD/GPO, ESXi/NSX or comparable), and implementing enclave boundary protections (firewalls, IDS/IPS, TACLANE/VPN).
Demonstrated support to Navy tactical networks (e.g., CANES-like programs), network operations, and assessment activities (TRR/DT/OT/CCRI).
Certifications
(DoD 8140/8570): IAT-III or IAM-III baseline (e.g., CISSP, CASP+, CISM); ability to obtain platform/tool-specific certs as assigned.
Education:
BS/BA in Cybersecurity, Computer Science, Information Systems, Engineering, or related field. Equivalent experience may substitute per GDIT policy.
Education:
BS/BA in Electrical/Computer/Systems Engineering, Computer Science, Information Technology, or related field; equivalent military training/experience considered.
Work Location:
Onsite NIWC Pacific, San Diego, CA (labs/shipyards/fleet concentration areas). Limited CONUS/OCONUS travel as tasking requires; ability to work in classified labs and onboard ships/submarines/airborne ground sites.
Position Availability:
Position is pending final contract award.
US Citizenship Required
What we’d love for you to have (Desired):
Prior support to
PMW-160 / NIWC Pacific
tactical networks; familiarity with
CANES ,
ADNS , or similar Navy programs.
Hands-on with
VMware
(VCP),
Red Hat
(RHCSA/RHCE),
Cisco
(CCNP Security),
Splunk/ELK ,
Kubernetes/containers , and STIG automation.
Experience with
GPON , QoS, wireless enclave security, SATCOM transport, and cross-domain/guard solutions.
Direct participation in
CCRI
events, DTO/OT&E, and audit remediation.
Knowledge of
COMSEC/CMS , TEMPEST coordination, and Navy cybersecurity policy implementation across multi-domain enclaves.
GDIT is your place GDIT IS YOUR PLACE
At GDIT, the mission is our purpose, and our people are at the center of everything we do.
Growth:
AI-powered career tool that identifies career steps and learning opportunities
Support:
An internal mobility team focused on helping you achieve your career goals
Rewards:
Comprehensive benefits and wellness packages, 401K with company match, and competitive pay and paid time off
Flexibility:
Full-flex work week to own your priorities at work and at home
Community:
Award-winning culture of innovation and a military-friendly workplace
Own your opportunity Explore a career at GDIT and you’ll find endless opportunities to grow alongside colleagues who share your ambition to deliver your best work.
#J-18808-Ljbffr