RMF & Authorizations Analyst
Listed on 2025-12-22
-
IT/Tech
Cybersecurity, Information Security
Type of Requisition
Regular
Clearance Level Must Currently PossessSecret
Clearance Level Must Be Able to ObtainSecret
Public Trust/Other RequiredNone
Job FamilyCyber and IT Risk Management
Job QualificationsSkills: Data Security, Security Incident Response, Security Information and Event Management (SIEM)
Certifications: None
Experience: 8 + years of related experience
US Citizenship
Required:
Yes
RMF $ Authorization Analyst
GDIT has an exciting opportunity to support the Security Assistance Group – Ukraine (SAG-U) as a member of our Enterprise Mission Information Technology Services (EMITS) program supporting U.S. Army Europe and Africa’s (USAREUR-AF) mission in Wiesbaden, Germany. The RMF & Authorizations Analyst plays a critical role in safeguarding mission systems through Risk Management Framework (RMF) implementation and sustainment. This position will lead efforts to secure and maintain Authority to Operate (ATO) for both enterprise and mission enclave systems such as SAGNet and TAN.
As part of the J6 Cyber Division (J62), this role will be responsible for RMF documentation, POA&M tracking, vulnerability remediation, and stakeholder coordination.
As an RMF & Authorizations Analyst at GDIT, your work ensures cyber compliance and operational continuity for critical Army systems. You’ll provide RMF expertise and ensure systems are properly assessed and authorized under DoD cybersecurity policy.
HOW YOU WILL MAKE AN IMPACT- Develop, maintain, and submit RMF packages in accordance with DoDI 8510.01 and NIST SP 800-37
- Coordinate with Authorizing Officials (AOs), ISSM, and ISSOs to maintain ATO status
- Collect artifacts and develop/refine COOP/DRP;
System Security Plans and Standard Operating Procedures as needed to ensure compliance with NIST SP 800-53 and CNSSI 1253. - Ensure all IA/Cybersecurity Controls for assessment and authorization are met and ultimate submission of package to the AO for an Approval to Operate on all Software and Hardware.
- Track, resolve, and document POA&M and vulnerability findings using tools such as eMASS and ACAS
- Support monthly continuous monitoring updates, control reviews, and artifact validation
- Provide RMF input for new IT initiatives, infrastructure changes, and enclave build-outs
- Assist in policy writing and user training on RMF best practices
- Perform vulnerability scanning using tools such as the DISA Gold Disk Scan and ACAS Scanner.
- Generate Evaluation Risk Reports and scorecards.
- Performs Computer Security Incident Response activities for a large organization; coordinates with other government agencies to record and report incidents.
- Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
- Recognizes potential; successful; and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
- Evaluate firewall change requests and assess organizational risk.
- Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure; applications and operating systems.
- Assists with implementation of counter-measures or mitigating controls.
- Ensures the integrity and protection of networks; systems; and applications by technical enforcement of organizational security policies; through monitoring of vulnerability scanning devices.
- Performs periodic and on-demand system audits and vulnerability assessments; including user accounts; application access; file system and external Web integrity scans to determine compliance.
- Prepares incident reports of analysis methodology and results.
- Provides guidance and work leadership to less-experienced technical staff members; and may have supervisory responsibilities.
- May serve as a technical team or task leader.
- Maintains current knowledge of relevant technology as assigned.
- Participates in special projects as required.
- Education: Bachelors Degree in Computer Science or a related technical discipline; or the equivalent combination of education; professional training or work experience.
- Experience: 8-10 years of related experience in data security…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).