Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.
Job DescriptionRMF $ Authorization Analyst
GDIT has an exciting opportunity to support the Security Assistance Group – Ukraine (SAG-U) as a member of our Enterprise Mission Information Technology Services (EMITS) program supporting U.S. Army Europe and Africa’s (USAREUR-AF) mission in Wiesbaden, Germany.
The RMF & Authorizations Analyst plays a critical role in safeguarding mission systems through Risk Management Framework (RMF) implementation and sustainment. This position will lead efforts to secure and maintain Authority to Operate (ATO) for both enterprise and mission enclave systems such as SAGNet and TAN. As part of the J6 Cyber Division (J62), this role will be responsible for RMF documentation, POA&M tracking, vulnerability remediation, and stakeholder coordination.
MEANINGFUL WORK AND PERSONAL IMPACT
As an RMF & Authorizations Analyst at GDIT, your work ensures cyber compliance and operational continuity for critical Army systems. You’ll provide RMF expertise and ensure systems are properly assessed and authorized under DoD cybersecurity policy.
HOW YOU WILL MAKE AN IMPACT
Develop, maintain, and submit RMF packages in accordance with DoDI 8510.01 and NIST SP 800-37
Coordinate with Authorizing Officials (AOs), ISSM, and ISSOs to maintain ATO status
Collect artifacts and develop/refine COOP/DRP; System Security Plans and Standard Operating Procedures as needed to ensure compliance with NIST SP 800-53 and CNSSI 1253.
Ensure all IA/Cybersecurity Controls for assessment and authorization are met and ultimate submission of package to the AO for an Approval to Operate on all Software and Hardware.
Track, resolve, and document POA&Ms and vulnerability findings using tools such as eMASS and ACAS
Support monthly continuous monitoring updates, control reviews, and artifact validation
Provide RMF input for new IT initiatives, infrastructure changes, and enclave build-outs
Assist in policy writing and user training on RMF best practices
Perform vulnerability scanning using tools such as the DISA Gold Disk Scan and ACAS Scanner.
Generate Evaluation Risk Reports and scorecards.
Performs Computer Security Incident Response activities for a large organization; coordinates with other government agencies to record and report incidents.
Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
Recognizes potential; successful; and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
Evaluate firewall change requests and assess organizational risk.
Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure; applications and operating systems.
Assists with implementation of counter-measures or mitigating controls.
Ensures the integrity and protection of networks; systems; and applications by technical enforcement of organizational security policies; through monitoring of vulnerability scanning devices.
Performs periodic and on-demand system audits and vulnerability assessments; including user accounts; application access; file system and external Web integrity scans to determine compliance.
Prepares incident reports of analysis methodology and results.
Provides guidance and work leadership to less-experienced technical staff members; and may have supervisory responsibilities.
May serve as a technical team or task leader.
Maintains current knowledge of relevant technology as assigned.
Participates in special projects as required.
WHAT YOU’LL NEED TO SUCCEED
Education: Bachelors Degree in Computer Science or a related technical discipline; or the equivalent combination of education; professional training or work experience.
Experience: 8-10 years of related experience in data security administration; 2 or more years direct C&A/A&A experience. Two or more years direct C&A/A&A experience required.
Technical Skills:
Deep understanding of NIST 800-53 controls, DoDI 8510.01, and the RMF lifecycle
Familiarity with DISA STIGs, IAVA management, and vulnerability scanning tools such as ACAS
Experience with POA&M management and ATO sustainment procedures
Clearance: Active DoD Secret clearance required
Citizenship: U.S. Citizenship required
ROLE REQUIREMENTS
Proven ability to coordinate across technical and security teams
Excellent written communication and documentation skills
Familiarity with enclave-level cyber posture and mission system security integration
Ability to work both independently and as part of a collaborative cyber compliance team
CERTIFICATIONS
Required: IAM Level III certification required (CISSP/CISM/GSLC). ITIL Foundation required within 90 days of hire
Preferred: Cisco CCNA, Cyber Ops VMware SPUNK, ISACA CCAK, ISC2 CCSP, Google, Amazon Microsoft Cloud Certification
PREFERRED QUALIFICATIONS
Experience supporting RMF for tactical or coalition mission systems
Knowledge of eMASS workflows and ATO approval process
Experience with networking devices such as router and switches
Experience with SPLUNK and VMware
This position may occasionally require some physical activity; lifting objects; bending; crouching down (i.e. to troubleshoot equipment); and long periods of sitting.
Must be approved for German TESA.
GDIT IS YOUR PLACE
At GDIT, the mission is our purpose, and our people are at the center of everything we do.
Growth: AI-powered career tool that identifies career steps and learning opportunities
Support: An internal mobility team focused on helping you achieve your career goals
Rewards: Comprehensive benefits and wellness packages, 401K with company match, and competitive pay and paid time off
Community: Award-winning culture of innovation and a military-friendly workplace
OWN YOUR OPPORTUNITY
Explore a career in cyber at GDIT and you’ll find endless opportunities to grow alongside colleagues who share your focus on defending and protecting what matters.
#DefenseOCONUS
#GDITRecruiting
#GDITArmy