Integration Team Developer

General Dynamics Information Technology Washington, District of Columbia 20001
JOB ID: 2018-37236 2/21/2018 7:17:43 AM




Job Description

General Dynamics IT has an opening for an Integration Team Developer with strong communication and technical skills that will support the designs and defines enterprise architecture for applications and infrastructure in support of the Department of Commerce Enterprise Security Operations Center (ESOC) and the NOAA Cyber Security Center (NCSC). The ESOC provides cybersecurity monitoring and situational awareness across the DOC, and in the future will likely expand to provide security services to other agencies in the DOC. The NCSC provides cybersecurity support across four major functional support groups; the NOAA Security Operations Center (SOC), NOAA Computer Incident Response Team (N-CIRT), System Administration Staff (SAS), and Enterprise Security Solutions (ESS).

The candidate must be a US Citizen and be able to obtain Department of Commerce vetting clearance.

Specific roles & responsibilities for the position include but not limited to the following:

* Performs complex systems development and design work that may include logic design, I/O design, firmware development, model formulation, manufacturing and development cost projections, computer architecture analysis and design, and analog or digital systems engineering.
* Performs systems modeling, simulation, and analysis.
* Participates in the upgrading of operating systems and design of systems enhancements.
* Provides input for documentation on new or existing systems.
* Develops and conducts tests to ensure systems meet documented user requirements.
* Identifies, analyzes, and resolves system problems.
* Provides system/equipment/specialized training and technical guidance.
* Determines system specifications, input/output processes, and working parameters for hardware/software compatibility.
* May provide guidance and work leadership to less-experienced systems engineers.
* Maintains current knowledge of relevant technology as assigned.
* Participates in special projects as assigned.

Additional experience in the following:

* Comprehensive knowledge of systems engineering principles, methods, and techniques.
* Knowledge of the associated hardware, software, and equipment.
* Professional certification in one or more specific technologies may be required, depending on job assignment.
* Requires understanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policies.

NIST NICE Cybersecurity Workforce Framework Alignment:

* Knowledge of the following: computer networking concepts and protocols, and network security methodologies, risk management processes (e.g., methods for assessing and mitigating risk), laws, regulations, policies, and ethics as they relate to cybersecurity and privacy, cybersecurity and privacy principles, cyber threats and vulnerabilities, specific operational impacts of cybersecurity lapses, computer algorithms, encryption algorithms, database systems, organization's enterprise information security architecture, organization's evaluation and validation requirements, electrical engineering as applied to computer architecture (e.g., circuit boards, processors, chips, and computer hardware), resiliency and redundancy, installation, integration, and optimization of system components, human-computer interaction principles, cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation), information security systems engineering principles (NIST SP 800-160), information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption), local area and wide area networking principles and concepts including bandwidth management, mathematics (e.g. logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis), microprocessors, network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML), operating systems, how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]), parallel and distributed computing concepts, policy-based and risk adaptive access controls, Privacy Impact Assessments, process engineering concepts, secure configuration management techniques. (e.g., Security Technical Implementation Guides (STIGs), cybersecurity best practices on, software development models (e.g., Waterfall Model, Spiral Model), software engineering, structured analysis principles and methods, system design tools, methods, and techniques, including automated systems analysis and design tools, system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design, system life cycle management principles, including software security and usability, systems testing and evaluation methods, telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing), the systems engineering process, Supply Chain Risk Management Practices (NIST SP 800-161), interpreted and compiled computer languages, information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures, critical infrastructure systems with information communication technology that were designed without system security considerations, network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth), network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools, service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]), security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model), circuit analysis, cybersecurity-enabled software products, various types of computer architectures, Personally Identifiable Information (PII) data security standards, Payment Card Industry (PCI) data security standards, Personal Health Information (PHI) data security standards, security management, an organization's information classification program and procedures for information compromise, countermeasure design for identified security risks, cryptology, embedded systems, Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression), network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services, network design processes, to include understanding of security objectives, operational objectives, and trade-offs, access authentication methods.
* Skills such as the following: creating policies that reflect system security objectives, designing countermeasures to identified security risks, designing security controls based on cybersecurity principles and tenets, designing the integration of hardware and software solutions, detecting host and network based intrusions via intrusion detection technologies (e.g., Snort), developing and applying security system access controls, discerning the protection needs (i.e., security controls) of information systems and networks, evaluating the adequacy of security designs, writing code in a currently supported programming language (e.g., Java, C++), conducting audits or reviews of technical systems, applying security controls, network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools, integrating and applying policies that meet system security objectives, creating policies that enable systems to meet performance objectives (e.g. traffic routing, SLA's, CPU specifications, the use of design modeling (e.g., unified modeling language), apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
* Abilities such as the following: apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation), identify critical infrastructure systems with information communication technology that were designed without system security considerations.


* Bachelor’s Degree in Computer Science, Engineering or a related technical discipline, or the equivalent combination of education, technical training, or work/military experience.

* 5-8 years of related systems engineering experience.

As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.


Security:Top Secret

Location: Washington, DC - District of Columbia