Back to Job Board

Job Title:  Military Cyber Warfare Information Auditor – FORT BELVOIR VA, US #16653



Cherokee Nation Strategic Programs (CNSP) offers federal, state and local agencies a wide range of intelligence, cyber operations and warfighter support services. CNSP focuses on quality performance in the collection and analysis of data, dissemination of useful information, and actionable real-world support to the intelligence and warfighter communities. Services offered by Cherokee Nation Applicants Strategic Programs apply to all national security communities including federal, state and local intelligence communities, the military and law enforcement agencies.


CNSP is seeking a Military Cyber Warfare Information Auditor to assist the Mission Assurance Department in accomplishing scheduled Joint Mission Assurance Assessments (JMAA), Mobile Training Team events, special assessments, and Higher Headquarters Program Reviews coordinated by the Joint Staff J-3. 




  • Perform vulnerability assessments, provide assessment and analysis expertise on cybersecurity programs, operational technology (OT), Industrial Control Systems (ICS), communications, and network assets. Evaluate and make recommendations on achievable means of enhancing cybersecurity posture through physical and cyber means. 
  • Reviews plans, procedures and processes related to the effectiveness and survivability.
  • Provide Network Defense vulnerability analysis, mitigation, and remediation regarding: continuity of operations andor disaster preparedness plans; configuration management, preventive maintenance and testing of OT, communication systems, and networks; ability of network to meet current and future communication needs.
  • Evaluate OT, communications, and network assets utilizing scanning tools, vulnerability monitoring, analysis, and detection services. Experience with tools and appliances such as Nessus, DoD Software Content Automation Protocol Tool,  DHC ICS-CERT Cyber Security Evaluation Tool (CSET), GrassMarlin, Skybox, Flying Squirrel, Glasswire, Microsoft  SysInternals Suite, OSForensics, FireEye Redline and SIEMs (Security Incident and Event Monitoring System), and Radio Frequency detection tools. Key locations for assessments include data and server facilities, system management centers, Cyber Program Offices, and Network and Security Operations Centers (NOSC). 
  • Provide oral and written communication regarding deficiencies and methods of correction and renders technical advice regarding condition of networks and information systems at the computing, network, and enclave information technology environments.
  • Reviewing Communication plans, Defense Continuity Plans, and other associated plans and provide feedback to improve the documents.
  • Evaluating and making recommendations for DoD facilities worldwide on achievable means of enhancing the communications networks andor systems to ensure local distribution networks and supporting off-site commercial facilities have the capacity, survivability, reliability, and security to support the mission.
  • Evaluating and making recommendations on secure and/or non-secure high speed digital data transmission, government satellite services, high frequency radio, long-haul military and commercial radio, telephone, voice frequency circuitry, wireless, facsimile, video, and computer network inter-switch trunks.
  • Performing single-point critical node analysis of an installation’s telecommunications, other communications systems, computer networks including supporting infrastructure (power, ventilation, fuel, fire protection etc.). Provide recommendations to reduce or mitigate system vulnerabilities due to terrorist, manmade and natural incidents.
  • Identifying threats/hazards that could affect the mission’s communications architecture and using this data to assess the vulnerability and risk to these assets.
  • Preparing Assessment Team Reports based upon vulnerabilities observed during the assessment.
  • Conducting other assessment areas defined by the SME Benchmark matrix




This position will not have supervisory authority.



  • Bachelor’s degree in Engineering, IT, or Cyber discipline or equivalent experience
  • Five years’ experience in Cyber Security related to DoD
  • Must have current Certified Ethical Hacker certification
  • TOP SECRET Clearance required




  • Understanding of Information Assurance and computer network defense concepts, practices and tools to design, administer, and evaluate vulnerabilities (physical and cyber) to classified and unclassified DoD computer networks and systems.
  • Understanding of Information Technology security certification and accreditation requirements sufficient to provide recommendations to customers.
  • Must meet certification requirements outline in DoD 8570.01-M for Computer Network Defense Auditor (CND-AU) within 6 months of employment.
  • Knowledge of DoDI 8510.01, DoDI 8500.01, and NIST SP 800 series
  • Knowledge of the DoD Risk Management Framework.
  • Knowledge of the Cybersecurity program to include experience working with commercial and military networks and communication systems.
  • Ability to effectively communicate via written and oral means.
  • Ability to handle multiple tasks with little to no supervision.
  • Ability to recommend solutions for mitigation and remediation of information and communication systems based on doctrine, requirements, instructions, national industry standards and best practices.
  • Ability to write assessment reports that can be understood at multiple levels.




The duties of this position are primarily performed in a climate controlled office environment. Occasional travel and overnight stay may be required.




The Mission Assurance Assessment Program model is designed to support commanders’ risk management processes, providing an assessment of potential risk to assets determined as critical to the execution of strategic missions.

Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information.

Salary commensurate with experience; full benefits package included


With $400 million in annual revenue, 20% growth per year, approximately 950+ active contracts serving 60+ government agencies in 25 countries, 47 states, 2 territories and 2000+ employees, Cherokee Nation Businesses’ (CNB) group of Federal Contracting Section 8(a) companies is well positioned to deliver expertise needed to solve complex technical issues. Federal Solutions provides an array of services for 12 of the 15 cabinet-level departments and agencies – from applications and data services to cybersecurity and national defense.

Why consider Cherokee Nation and our Federal Solutions business? Here are some great resources highlighting what we do and compelling reasons for joining our team!


Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information.

We are an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected Veteran status, gender identity and sexual orientation. If you’d like more information about your EEO rights as an applicant under the law, please copy and paste the links to the following two sites: EEO Statement | EEO Poster

If you are an individual with a disability and require a reasonable accommodation to complete any part of the application process, or are limited in the ability or unable to access or use this online application process and need an alternative method for applying, you may email “” for assistance. This email address is for accommodation requests only and cannot be used to inquire about the application process or status.

For Pay Transparency Non Discrimination provision, please copy and paste the following link: Pay Transparency Nondiscrimination Provision

We maintain an Affirmative Action Plan for the purpose of proactively seeking employment and advancement for qualified protected veterans and individuals with disabilities. Upon request, we will schedule time to make our Affirmative Action Plan accessible. If you are interested, please submit a written request with the email subject line: 2018 Request to View Affirmative Action Plan to the Compliance Administrator at “”

This email box is not for resumes or follow up on job applications.