Type of Requisition: Regular
Clearance Level Must Be Able to Obtain: Secret
Public Trust/Other Required: None
Job Family: Software Development
Summary
Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Monitors, evaluates, and maintains systems and procedures to safeguard internal information systems, network, databases, and Web-based security.
SW Engineering Roles
Works with a team of developers, data engineers and data scientists to create web applications to collect and manage data in support of Internet and social media activities
Participates in Agile project management methodologies to support all aspects of the software development lifecycle (SDLC)
Works within a team environment using Confluence, Jira and Slack to manage, assign and collaborate on work tasks
Develops Web applications in Ruby on Rails or Django/Python on Linux and deployed in AWS using MySQL and RedShift databases
Reviews projects’ ability to deliver robust and scalable solutions, learning and incorporating new technologies as appropriate
Supports database engineering by providing Python support using AWS Lambda
Builds and operates scalable and secure systems on AWS
IT Security Roles
Develops, implements, communicates and enforces security policies or plans for data, software applications, hardware, telecommunications, and information systems
Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring and reporting
Performs periodic and on-demand system audits and vulnerability assessments, to verify systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans including user accounts, application access, file system and external Web applications
Reviews code for security and compliance to coding standards
Safeguards the network against unauthorized infiltration, modification, destruction, or disclosure
Assists with implementation of countermeasures or mitigating controls
Conducts investigations of information systems security violations and incidents, reporting as necessary to management
Monitors and analyzes Intrusion Detection Systems (IDS) to identify security issues for remediation; Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information
Prepares incident reports
Ensure compliance with regulations and privacy laws
Overall Responsibilities
Responsible for DevSecOps of project applications supporting the customer
May coach and provide guidance to less-experienced professionals
May serve as a team or task lead
Qualifications
EDUCATION: BA/BS or equivalent in Computer Science or related fields
EXPERIENCE: 5+ years of experience
CLEARANCE: Must be able to obtain SECRET clearance; current DoD SECRET clearance preferred
Notes to Supplier:
Instructions to Supplier for Submitting Candidates (Last Revised Date 10/30/2020):
*Candidate submissions must be completed using the instructions below; if instructions are not followed, the submission cannot be processed, and the candidate will be declined
Resumes must be submitted through Workday; sending resumes directly to a Hiring Manager is in violation of GDIT’s policy.
Enter candidate’s LEGAL name (not a nickname) with proper capitalization (not in all caps) and if there’s no middle name, leave the Middle Name field blank (do not enter “N/A”)
Do NOT enter candidate’s personal email address or your email address in the candidate’s profile; rather enter a unique fake email address associated with the Supplier. For example: Candidate’[email protected] ( [email protected] )
On the Submit Candidate screen, after entering the candidate’s name, scroll to the Skills, Experience & Education tab, in the Summary field, enter:
Candidate’s Bill Rate
Candidate’s Pay Rate
Candidate’s Desired Conversion Salary
Candidate’s Level of Security Clearance (if applicable)
Supplier Company Name, Supplier Representative’s Name, Email Address and Phone Number
When submitting a candidate, you must complete a questionnaire after submitting the resume; if this questionnaire is not completed, the candidate has not been submitted
When sending emails regarding this requisition, include the req number to the Subject Line of the email.
Please note that it is standard practice to follow GDIT’s MSAA (Master Service Agency Agreement) that Supplier Candidates must be bona fide (W-2) employees of the Supplier. Supplier shall not provide Purchased Labor using independent contractors, subcontractors, or other suppliers. There is no exception to this rule.
Instructions to Supplier for Uploading Exhibits (Last Revised Date: 10/9/2020)
*Exhibits must be completed using the instructions below; Exhibits not completed in the correct format cannot be processed.
Exhibits will be requested after the CLA Candidate Selection email is sent or the “offer” is accepted; they cannot be uploaded prior to that request and will not be visible to you
The most recently updated version of the Exhibits will be visible in Workday in your inbox when they are requested by the CLMS – you must you this version
Instructions for completing Exhibits will be provided upon request
If Exhibits need to be re-uploaded due to an error, they must be re-requested through Workday by the assigned CLMS
COVID-19 Vaccination Requirement: To protect the health and safety of its employees and to comply with customer requirements, GDIT may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
United Talent Staffing is immediately hiring 2nd Shift Production Operator Associates in the Villa Rica area! $17 per hourJob Duties:Moving...
Apply For This JobHephzibah Children’s Association is a renowned social service agency in Oak Park, IL offering a variety of programs including residential...
Apply For This Job“We’re not in the shipping business; we’re in the information business.” -Peter Rose, Expeditors Founder Global supply chain management is...
Apply For This JobJob Location: Hobbs, New Mexico ( 88240) & Seminole, Texas (79360) Work days/Shift Hours – if applicable: 6:00am start time...
Apply For This JobLocation: ZelienopleCompensation: Based on experience Are you looking to make a job change? Would you find it fulfilling to help...
Apply For This JobDescription Ingram Micro is an integral part of the technology ecosystems, helping our partners grow and thrive through the creation...
Apply For This Job