ClearanceJobs
Information Assurance Security Engineer (Tactical Networks - CAN
ClearanceJobs, San Diego, California, United States, 92189
Tactical Networks Information Assurance (IA) Security Engineer
Transform technology into opportunity as a Tactical Networks Information Assurance (IA) Security Engineer with GDIT. A career in Security Engineering means connecting and hardening the systems that matter most. At GDIT you'll be at the forefront of innovation-advancing Consolidated Afloat Networks and Enterprise Services (CANES) and related Navy tactical network capabilities for NIWC Pacific (Codes 55131/55132/55133) in support of PMW-160 Tactical Networks. At GDIT, people are our differentiator. Our work depends on a Senior IA Security Engineer who can lead Risk Management Framework (RMF) Authorization & Accreditation (A&A), harden virtualized/cloud network stacks, and drive compliance across ashore, afloat, subsurface, airborne, mobile, and joint environments. Meaningful Work And Personal Impact: Lead end-to-end RMF for CANES baselines; develop IATT/ATO packages in eMASS; maintain SSP, SAP/SAR, POA&M, CONMON, IR/CM/CP/MA policies, and PPSM artifacts. Engineer secure architectures for virtualized (e.g., VMware/ESXi/NSX), cloud/hosting, GPON, wireless, and mission transport; apply DISA STIGs, ACAS/SCAP scanning, IAVM remediation, and continuous monitoring. Provide IA guidance for application integration on CANES; align with DoDAF, NESI/DISR, Net-Ready KPP, and program technical baselines. Support Developmental Test & Evaluation (DT&E), TRRs, CCRI prep, and audit response; capture findings and remediation to preserve ATO conditions. Coordinate with PEO C4I/PMW-160, NIWC Pacific engineers, and Fleet stakeholders; brief risks, mitigation, and compliance status to IPTs/WIPTs and CCB/PTRB venues. Integrate with Configuration Management (e.g., CMPro) ensuring cyber posture is tied to approved hardware/software baselines. Mentor junior engineers; champion DevSecOps practices and STIG automation (e.g., Ansible) to accelerate secure deployments. What You'll Need To Succeed (Required): Security Clearance: Active Secret clearance. Experience:
3 years IA/cybersecurity engineering for enterprise or tactical networks, including RMF A&A and eMASS package development. 3 years applying DISA SRGs/STIGs, ACAS/NESSUS, SCAP, vulnerability management, and IAVM compliance; authoring SAP/SAR and managing POA&Ms. 3 years securing virtualized environments (Windows/Linux hardening, AD/GPO, ESXi/NSX or comparable), and implementing enclave boundary protections (firewalls, IDS/IPS, TACLANE/VPN). Demonstrated support to Navy tactical networks (e.g., CANES-like programs), network operations, and assessment activities (TRR/DT/OT/CCRI).
Certifications (DoD 8140/8570): IAT-III or IAM-III baseline (e.g., CISSP, CASP+, CISM); ability to obtain platform/tool-specific certs as assigned. Education: BS/BA in Cybersecurity, Computer Science, Information Systems, Engineering, or related field. Equivalent experience may substitute per GDIT policy. Education: BS/BA in Electrical/Computer/Systems Engineering, Computer Science, Information Technology, or related field; equivalent military training/experience considered. Work Location: Onsite NIWC Pacific, San Diego, CA (labs/shipyards/fleet concentration areas). Limited CONUS/OCONUS travel as tasking requires; ability to work in classified labs and onboard ships/submarines/airborne ground sites. Position Availability: Position is pending final contract award. US Citizenship Required What We'd Love For You To Have (Desired): Prior support to PMW-160/NIWC Pacific tactical networks; familiarity with CANES, ADNS, or similar Navy programs. Hands-on with VMware (VCP), Red Hat (RHCSA/RHCE), Cisco (CCNP Security), Splunk/ELK, Kubernetes/containers, and STIG automation. Experience with GPON, QoS, wireless enclave security, SATCOM transport, and cross-domain/guard solutions. Direct participation in CCRI events, DTO/OT&E, and audit remediation. Knowledge of COMSEC/CMS, TEMPEST coordination, and Navy cybersecurity policy implementation across multi-domain enclaves. GDIT Is Your Place Growth: AI-powered career tool that identifies career steps and learning opportunities Support: An internal mobility team focused on helping you achieve your career goals Rewards: Comprehensive benefits and wellness packages, 401K with company match, and competitive pay and paid time off Flexibility: Full-flex work week to own your priorities at work and at home Community: Award-winning culture of innovation and a military-friendly workplace Own Your Opportunity Explore a career at GDIT and you'll find endless opportunities to grow alongside colleagues who share your ambition to deliver your best work. Work Requirements
Transform technology into opportunity as a Tactical Networks Information Assurance (IA) Security Engineer with GDIT. A career in Security Engineering means connecting and hardening the systems that matter most. At GDIT you'll be at the forefront of innovation-advancing Consolidated Afloat Networks and Enterprise Services (CANES) and related Navy tactical network capabilities for NIWC Pacific (Codes 55131/55132/55133) in support of PMW-160 Tactical Networks. At GDIT, people are our differentiator. Our work depends on a Senior IA Security Engineer who can lead Risk Management Framework (RMF) Authorization & Accreditation (A&A), harden virtualized/cloud network stacks, and drive compliance across ashore, afloat, subsurface, airborne, mobile, and joint environments. Meaningful Work And Personal Impact: Lead end-to-end RMF for CANES baselines; develop IATT/ATO packages in eMASS; maintain SSP, SAP/SAR, POA&M, CONMON, IR/CM/CP/MA policies, and PPSM artifacts. Engineer secure architectures for virtualized (e.g., VMware/ESXi/NSX), cloud/hosting, GPON, wireless, and mission transport; apply DISA STIGs, ACAS/SCAP scanning, IAVM remediation, and continuous monitoring. Provide IA guidance for application integration on CANES; align with DoDAF, NESI/DISR, Net-Ready KPP, and program technical baselines. Support Developmental Test & Evaluation (DT&E), TRRs, CCRI prep, and audit response; capture findings and remediation to preserve ATO conditions. Coordinate with PEO C4I/PMW-160, NIWC Pacific engineers, and Fleet stakeholders; brief risks, mitigation, and compliance status to IPTs/WIPTs and CCB/PTRB venues. Integrate with Configuration Management (e.g., CMPro) ensuring cyber posture is tied to approved hardware/software baselines. Mentor junior engineers; champion DevSecOps practices and STIG automation (e.g., Ansible) to accelerate secure deployments. What You'll Need To Succeed (Required): Security Clearance: Active Secret clearance. Experience:
3 years IA/cybersecurity engineering for enterprise or tactical networks, including RMF A&A and eMASS package development. 3 years applying DISA SRGs/STIGs, ACAS/NESSUS, SCAP, vulnerability management, and IAVM compliance; authoring SAP/SAR and managing POA&Ms. 3 years securing virtualized environments (Windows/Linux hardening, AD/GPO, ESXi/NSX or comparable), and implementing enclave boundary protections (firewalls, IDS/IPS, TACLANE/VPN). Demonstrated support to Navy tactical networks (e.g., CANES-like programs), network operations, and assessment activities (TRR/DT/OT/CCRI).
Certifications (DoD 8140/8570): IAT-III or IAM-III baseline (e.g., CISSP, CASP+, CISM); ability to obtain platform/tool-specific certs as assigned. Education: BS/BA in Cybersecurity, Computer Science, Information Systems, Engineering, or related field. Equivalent experience may substitute per GDIT policy. Education: BS/BA in Electrical/Computer/Systems Engineering, Computer Science, Information Technology, or related field; equivalent military training/experience considered. Work Location: Onsite NIWC Pacific, San Diego, CA (labs/shipyards/fleet concentration areas). Limited CONUS/OCONUS travel as tasking requires; ability to work in classified labs and onboard ships/submarines/airborne ground sites. Position Availability: Position is pending final contract award. US Citizenship Required What We'd Love For You To Have (Desired): Prior support to PMW-160/NIWC Pacific tactical networks; familiarity with CANES, ADNS, or similar Navy programs. Hands-on with VMware (VCP), Red Hat (RHCSA/RHCE), Cisco (CCNP Security), Splunk/ELK, Kubernetes/containers, and STIG automation. Experience with GPON, QoS, wireless enclave security, SATCOM transport, and cross-domain/guard solutions. Direct participation in CCRI events, DTO/OT&E, and audit remediation. Knowledge of COMSEC/CMS, TEMPEST coordination, and Navy cybersecurity policy implementation across multi-domain enclaves. GDIT Is Your Place Growth: AI-powered career tool that identifies career steps and learning opportunities Support: An internal mobility team focused on helping you achieve your career goals Rewards: Comprehensive benefits and wellness packages, 401K with company match, and competitive pay and paid time off Flexibility: Full-flex work week to own your priorities at work and at home Community: Award-winning culture of innovation and a military-friendly workplace Own Your Opportunity Explore a career at GDIT and you'll find endless opportunities to grow alongside colleagues who share your ambition to deliver your best work. Work Requirements