×
Register Here to Apply for Jobs or Post Jobs. X

RMF & Authorizations Analyst

Job in Kenmare, Ward County, North Dakota, 58746, USA
Listing for: General Dynamics Information Technology
Full Time position
Listed on 2025-12-22
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below
Location: Kenmare

Type of Requisition

Regular

Clearance Level Must Currently Possess

Secret

Clearance Level Must Be Able to Obtain

Secret

Public Trust/Other Required

None

Job Family

Cyber and IT Risk Management

Job Qualifications

Skills: Data Security, Security Incident Response, Security Information and Event Management (SIEM)

Certifications: None

Experience: 8 + years of related experience

US Citizenship

Required:

Yes

Job Description

RMF $ Authorization Analyst

GDIT has an exciting opportunity to support the Security Assistance Group – Ukraine (SAG-U) as a member of our Enterprise Mission Information Technology Services (EMITS) program supporting U.S. Army Europe and Africa’s (USAREUR-AF) mission in Wiesbaden, Germany. The RMF & Authorizations Analyst plays a critical role in safeguarding mission systems through Risk Management Framework (RMF) implementation and sustainment. This position will lead efforts to secure and maintain Authority to Operate (ATO) for both enterprise and mission enclave systems such as SAGNet and TAN.

As part of the J6 Cyber Division (J62), this role will be responsible for RMF documentation, POA&M tracking, vulnerability remediation, and stakeholder coordination.

MEANINGFUL WORK AND PERSONAL IMPACT

As an RMF & Authorizations Analyst at GDIT, your work ensures cyber compliance and operational continuity for critical Army systems. You’ll provide RMF expertise and ensure systems are properly assessed and authorized under DoD cybersecurity policy.

HOW YOU WILL MAKE AN IMPACT
  • Develop, maintain, and submit RMF packages in accordance with DoDI 8510.01 and NIST SP 800-37
  • Coordinate with Authorizing Officials (AOs), ISSM, and ISSOs to maintain ATO status
  • Collect artifacts and develop/refine COOP/DRP;
    System Security Plans and Standard Operating Procedures as needed to ensure compliance with NIST SP 800-53 and CNSSI 1253.
  • Ensure all IA/Cybersecurity Controls for assessment and authorization are met and ultimate submission of package to the AO for an Approval to Operate on all Software and Hardware.
  • Track, resolve, and document POA&M and vulnerability findings using tools such as eMASS and ACAS
  • Support monthly continuous monitoring updates, control reviews, and artifact validation
  • Provide RMF input for new IT initiatives, infrastructure changes, and enclave build-outs
  • Assist in policy writing and user training on RMF best practices
  • Perform vulnerability scanning using tools such as the DISA Gold Disk Scan and ACAS Scanner.
  • Generate Evaluation Risk Reports and scorecards.
  • Performs Computer Security Incident Response activities for a large organization; coordinates with other government agencies to record and report incidents.
  • Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
  • Recognizes potential; successful; and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
  • Evaluate firewall change requests and assess organizational risk.
  • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure; applications and operating systems.
  • Assists with implementation of counter-measures or mitigating controls.
  • Ensures the integrity and protection of networks; systems; and applications by technical enforcement of organizational security policies; through monitoring of vulnerability scanning devices.
  • Performs periodic and on-demand system audits and vulnerability assessments; including user accounts; application access; file system and external Web integrity scans to determine compliance.
  • Prepares incident reports of analysis methodology and results.
  • Provides guidance and work leadership to less-experienced technical staff members; and may have supervisory responsibilities.
  • May serve as a technical team or task leader.
  • Maintains current knowledge of relevant technology as assigned.
  • Participates in special projects as required.
WHAT YOU’LL NEED TO SUCCEED
  • Education: Bachelors Degree in Computer Science or a related technical discipline; or the equivalent combination of education; professional training or work experience.
  • Experience: 8-10 years of related experience in data security…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary