Information Security Analyst-Senior; RMF
Listed on 2026-02-17
-
IT/Tech
Cybersecurity, Information Security, IT Consultant
Information Security Analyst‑Senior (RMF)
Job Category:
Information Technology
Time Type:
Full time
Minimum Clearance Required to Start: TS/SCI
Employee Type:
Regular
Percentage of
Travel Required:
Up to 10%
Type of Travel:
Continental US
Manages, maintains and reviews Certifications and Accreditation documents for supported Automated Information Systems to ensure compliance with DoD and Intelligence Community Risk Management Framework (RMF) standards. Maintains comprehensive knowledge of DoD and other associated directives that govern DoD RMF and Intelligence Directive 503. Conducts security reviews, scans, evaluations and risk assessments to identify security risks and the impact of potential cyber vulnerabilities.
Evaluates security procedures to implement and ensures potential users are aware of and comply with command Cyber Security policies and procedures to generate and maintain required documentation for supported information systems, including the System Security Plan, the Risk Assessment, the Plan of Action and Milestones, and the Authority to Operate (Operate) or to Connect.
- Identify systemic security issues based on the analysis of vulnerability and configuration data
- Reconcile customer requirements within acceptable risks determined by DOD policies, command policies and generally accepted practices; make recommendations for tools and processes to improve CS initiatives
- Apply knowledge of Risk Management Framework (RMF) requirements
- Respond to daily inquiries via email, phone or in‑person from organization members
- Demonstrate appropriate discretion when handling classified/sensitive information
- Conduct vulnerability scans and recognize vulnerabilities in security systems
- Stay current on new and emerging IT and information security technologies
- Understand system lifecycle management principles, including software security and usability
- Perform continuous analysis to identify network and system vulnerabilities
- Identify system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross‑site scripting, PL/SQL injections, race conditions, covert channel, replay, return‑oriented attacks, malicious code)
- Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions
- Apply knowledge of server administration and systems engineering theories, concepts, and methods
- Administer, operate, and maintain multiple vulnerability management servers/applications and the RMF web database tool
- A DOD Top Secret Security Clearance with DCID 6/4 eligibility
- Current DOD 8570 IAT Level II certification
- 4–6 years’ experience in Cybersecurity (Information Assurance) compliance and vulnerability testing
- Experience with COTS/GOTS/DOD CS Tools for security analysis and network scanning
- Vulnerability tool administration and execution
- Proficient with MS Office products
- Exceptional organizational, presentation and communication skills (verbal and written)
- Excellent listening and comprehension skills; ability to extract and clearly articulate key concepts and requirements from verbal discussions, documentation and transcripts
- Familiarity with handling and marking of classified information
- Familiarity with security policies governing the storage of, access to, and transmittal of classified information
- Self‑starter, self‑managed, responsive and dedicated, with a proven track record of high performance, productivity and meeting deadlines
- Customer‑service mindset and teamwork skills
- High initiative and innovative problem‑solving ability
- Positive attitude in a fast‑paced, constantly changing environment
- Ability to work cooperatively and proactively with personnel at various levels within the organization
- Military background and experience with SOF
- Application security experience
- Software programming experience
- Current DOD 8570 IAT III certification
- B.S. or M.S. in Computer Science, Information Security, Mathematics, or a related IT field
At CACI, we place character and innovation at the center of everything we do. As a valued team member, you’ll be part of a high‑performing group dedicated…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).