The Intel and Cyber Division is assembling a team of network engineers, systems engineers, Unified Communications Engineers, and Integration Engineers, change management specialists, information assurance professionals, and procurement personnel knowledgeable in SCRM processes to support a program that provides critical network capabilities. We are committed to recruiting and retaining this team for prototype development, test, and demonstration, as well as making this team available longer term for integration, deployment and sustainment as needed.
Candidates interested in joining the team must be critical thinkers, have a strong work ethic, and be able to work independently or as a member of a team in a dynamic environment that supports a critical and rewarding mission. We value candidates who are detail-oriented while also being able to think and react quickly to emerging and unique problem sets. To be successful, you must be able to rapidly adapt and learn how to operate the front and back end of new products and processes.
Responsibilities\:
Generate and maintain the complete security Body of Evidence (BoE) while leading the A&A activities according to the Risk Management Framework (RMF) processes (ICD 503, CNSSI-1253, NIST 800-37, NIST 800-53, etc.) for all multiple information systems. Lead the development and maintenance of information security policies, standards, and control procedures to enable compliance with RMF. Complete Security Authorization packages, to include System Security Plans, Security Assessment Reports, POA&M summaries and a Continuous Monitoring Plan/assessment schedule, and present executive briefing to senior management. Ensure security risk assessments are conducted as appropriate on any system upgrades, software/hardware changes, etc. Ensure security authorization boundaries are properly defined and captured in the system security plans, and that all interconnection agreements are in place and current. Ensure system security controls contain accurate implementation statements and assessments results, and that appropriate artifacts are completed to support findings provide hands-on assistance as appropriate. Ensure POA&Ms have appropriate milestones, accurate description of the weaknesses and remediation, estimated cost to completion and realistic due dates providing hands-on assistance to components as necessary. Maintain day-to-day security posture and continuous monitoring of all Information Systems. Review system vulnerability scans, verify implementation of DISA STIG’s, and ensure other security relevant information system configuration tasks are completed. Perform test/evaluation of required technical security controls including performing certification tests and periodic inspections of information systems. Develop and conduct test procedures for verification Assessment and Authorization (A&A), Risk Management Framework (RMF) safeguards to meet customer requirements based NIST publications. Assess changes to an IS by performing periodic self-inspections, tests, and reviews of the IS program to ensure that systems are operating as authorized/accredited and that conditions have not changed; ensure corrective actions are taken for identified findings and vulnerabilities. *The Intel and Cyber Division is assembling a team of network engineers, systems engineers, Unified Communications Engineers, and Integration Engineers, change management specialists, information assurance professionals, and procurement personnel knowledgeable in SCRM processes to support a program that provides critical network capabilities. We are committed to recruiting and retaining this team for prototype development, test, and demonstration, as well as making this team available longer term for integration, deployment and sustainment as needed.
Candidates interested in joining the team must be critical thinkers, have a strong work ethic, and be able to work independently or as a member of a team in a dynamic environment that supports a critical and rewarding mission. We value candidates who are detail-oriented while also being able to think and react quickly to emerging and unique problem sets. To be successful, you must be able to rapidly adapt and learn how to operate the front and back end of new products and processes.
Responsibilities\:
Generate and maintain the complete security Body of Evidence (BoE) while leading the A&A activities according to the Risk Management Framework (RMF) processes (ICD 503, CNSSI-1253, NIST 800-37, NIST 800-53, etc.) for all multiple information systems. Lead the development and maintenance of information security policies, standards, and control procedures to enable compliance with RMF. Complete Security Authorization packages, to include System Security Plans, Security Assessment Reports, POA&M summaries and a Continuous Monitoring Plan/assessment schedule, and present executive briefing to senior management. Ensure security risk assessments are conducted as appropriate on any system upgrades, software/hardware changes, etc. Ensure security authorization boundaries are properly defined and captured in the system security plans, and that all interconnection agreements are in place and current. Ensure system security controls contain accurate implementation statements and assessments results, and that appropriate artifacts are completed to support findings provide hands-on assistance as appropriate. Ensure POA&Ms have appropriate milestones, accurate description of the weaknesses and remediation, estimated cost to completion and realistic due dates providing hands-on assistance to components as necessary. Maintain day-to-day security posture and continuous monitoring of all Information Systems. Review system vulnerability scans, verify implementation of DISA STIG’s, and ensure other security relevant information system configuration tasks are completed. Perform test/evaluation of required technical security controls including performing certification tests and periodic inspections of information systems. Develop and conduct test procedures for verification Assessment and Authorization (A&A), Risk Management Framework (RMF) safeguards to meet customer requirements based NIST publications. Assess changes to an IS by performing periodic self-inspections, tests, and reviews of the IS program to ensure that systems are operating as authorized/accredited and that conditions have not changed; ensure corrective actions are taken for identified findings and vulnerabilities. * Active TS/SCI Security Clearance 8 years of related experience Bachelor's degree in cybersecurity or related field; experience considered in lieu of degree Current Security Certification Previous supervision and/or participation with cybersecurity Assessment and Authorizations. Ability to provide hands-on cyber security tool assistance as necessary. Experience with Microsoft Office applications such as Excel, Word, and Outlook. Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the Risk Management Framework. Experience with security configurations across multiple operating systems in various environments, including Windows, Linux, UNIX, utilizing Active Directory/Group Policy. In-depth knowledge of Microsoft Windows OS (client and server) Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the Risk Management Framework. Experience with eMASS, XACTA, ACAS/NESSUS, Trellix, and Splunk. Experience with risk managed downloads, IS sanitization and destruction, contaminations, incident response, virus scanning, privileged user access, and hardware/software configuration management. Experience with developing IT policy, guidance, or procedure documentation supporting cybersecurity accreditations. Experience with analyzing, assessing, or implementing NIST SP 800-53 security controls, CCIs, and associated assessment procedures. Experience with developing and presenting complex technical information for technical and non-technical audiences. Expert familiarity with RMF. Experience with Microsoft Office applications such as Excel, Word, Outlook, and SharePoint. Ability to travel up to 10%.Preferred\:
· Familiarity with cybersecurity tool suite; ForeScout, Avanti, and HBSS.
· Familiarity with Red Hat Enterprise Linux (RHEL).
The base salary range for this position is $165K to $175K. This range reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.
* Active TS/SCI Security Clearance 8 years of related experience Bachelor's degree in cybersecurity or related field; experience considered in lieu of degree Current Security Certification Previous supervision and/or participation with cybersecurity Assessment and Authorizations. Ability to provide hands-on cyber security tool assistance as necessary. Experience with Microsoft Office applications such as Excel, Word, and Outlook. Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the Risk Management Framework. Experience with security configurations across multiple operating systems in various environments, including Windows, Linux, UNIX, utilizing Active Directory/Group Policy. In-depth knowledge of Microsoft Windows OS (client and server) Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the Risk Management Framework. Experience with eMASS, XACTA, ACAS/NESSUS, Trellix, and Splunk. Experience with risk managed downloads, IS sanitization and destruction, contaminations, incident response, virus scanning, privileged user access, and hardware/software configuration management. Experience with developing IT policy, guidance, or procedure documentation supporting cybersecurity accreditations. Experience with analyzing, assessing, or implementing NIST SP 800-53 security controls, CCIs, and associated assessment procedures. Experience with developing and presenting complex technical information for technical and non-technical audiences. Expert familiarity with RMF. Experience with Microsoft Office applications such as Excel, Word, Outlook, and SharePoint. Ability to travel up to 10%.Preferred\:
· Familiarity with cybersecurity tool suite; ForeScout, Avanti, and HBSS.
· Familiarity with Red Hat Enterprise Linux (RHEL).
The base salary range for this position is $165K to $175K. This range reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.