Support secure network design and cybersecurity risk management for TARCES infrastructure while leading the protection of data assets and ensuring compliance with federal frameworks.
The Naval Air Warfare Center Aircraft Division (NAWCAD) Webster Outlying Field (WOLF) Special Communications Mission Solutions (SCMS) Division provides in-service engineering and full lifecycle support for Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance (C5ISR) systems. Operating under the oLSI® model, the SCMS Division supports Tactical and Remote Command, Control, Communications, Computers, Cyber, and Intelligence (C5I) Edge Systems (TARCES) across commercial and militarized vehicles, maritime platforms, mobile communications units, fixed base stations, command centers, and intelligence systems.
The Advanced Information Security Analyst supports secure network design, data protection, and cybersecurity risk management for TARCES infrastructure, ensuring resilient and compliant operations across tactical and enterprise-scale environments. This position is considered Key and will be available upon contract award. We are seeking candidates who are will to accept contingent offers immediately.
Responsibilities
Required Qualifications
Desired Qualifications
Why Join Us?
At MAXISIQ, inclusion drives innovation. We are committed to creating a diverse and equitable workplace where all qualified applicants receive consideration for employment including Veterans and Individuals with Disabilities.
IOMAXIS delivers advanced cyber research, development, test, and evaluation (RDT&E) services by combining industry expertise in software, hardware, communications, and security. Our solutions address the critical missions of clients, providing them with the innovative technologies and actionable capabilities they need to operate effectively in a complex environment.
Understand the required skills and qualifications, anticipate the questions you may be asked, and study well-prepared answers using our sample responses.
Information Security Analyst Q&A's