Description
PE Systems, Inc. has a great opportunity for aCybersecurity Support, Seniorin the Training Directorate at Wright Patterson AFB, OH. The mission of the Training Directorate is to develop, deliver, and sustain integrated training capabilities to employ war-winning airpower. At PE Systems, Inc., we truly value our employees. We unite exceptional talent with rewarding careers. Our dedicated team enjoys generous PTO, holidays, competitive pay, and outstanding benefits! Voted Best Places to Work in Dayton since 2022! General Function:
- Possess working knowledge of the Risk Management Framework (RMF) process, information system concepts, control families, media, equipment, equipment configuration, and related software systems, processes, and procedures.
- Assess and advise on vulnerabilities from various sources including hacking, denial of service attacks, and destructive software.
- Apply methods and procedures for system and application protection.
- Assist in verifying that personnel accessing systems possess the required cybersecurity certifications in accordance with DoD 8570.01-M and AFM 17-1303.
- Support tasks related to any cybersecurity functions.
- Assist with preparation of corrective actions to ensure compliance with DoD 8570.01.
- Assist in implementing DoD, USAF, and MAJCOM cybersecurity policies and in updating local procedures for operational support.
- Help organize, coordinate, identify, and fulfill cybersecurity (IA) requirements aligned with DoD standards and architectures.
- Support formulation of system architectural designs, functional specifications, interfaces, and documentation.
- Utilize RMF to support system Authorization and Accreditation (A&A).
- Monitor systems throughout their lifecycle from concept to decommission.
- Support development, modification, review, and coordination of IT Categorization Determination packages, IA Strategies, IA Plans, PPPs, SSPs, Assessments, ISAs, testing, and design documents.
- Contribute to baseline control selection, applicability assessments, mitigation planning, configuration management, continuous monitoring, and liaison roles.
- Lead or assist in IA Integrated Process Teams (IAIPTs).
- Develop artifacts for program reviews and assess IA requirements in RFPs and ECPs.
- Evaluate security designs for compliance with JSIG, NIST 800-53, DoD 8500.01, 8510.01, 5200.39, AFI 33-210, DCID 6/3.
- Apply knowledge of telecommunications concepts, operating modes, systems, media, equipment configuration, and software systems.
- Advise on vulnerabilities from espionage, disruption, and destructive software, and recommend protection methods.
- Understand and apply principles of computer science, information management, and ADP functions.
- Interface with minicomputer and mainframe systems to meet project goals.
- Use standard techniques to assist in defining, developing, testing, and integrating systems and models.
- Assist in formulating system designs, specifications, interfaces, and documentation.
- Apply detailed specifications and standardized methods to develop or modify system components.
- Recommend storage and data retrieval methods and formulate functional requirements for information systems.
- Assist in modifying IA/Cybersecurity strategies for external systems.
- Monitor information system activities for integrity, perform access/revocation tasks, and help maintain control facilities.
- Report incidents and attacks per AFSSI 5021 and ensure system sanitization per AFSSI 5020.
- Develop and coordinate PIT determination packages, IA Strategies, IA Plans, SSPs, Assessments, ISAs, and testing documentation.
- Support lifecycle security, liaise with developers, users, and program managers.
- Provide input for SOOs, PWSs, RFPs, and CDRLs related to program security.
- Integrate export and technology control laws and policies into protection planning.
- Recommend changes to security policies and assist in developing SCGs and PSDs.
- Review trade studies to balance security risks and program costs.
- Design cost-effective ways to embed security in weapon system contracts.
- Evaluate security procedures for handling unclassified CPI/CI and classified material.
- Analyze procedures for handling, controlling, and disposing of classified or critical hardware.
- Produce analysis reports with recommended actions.
- Demonstrate advanced understanding of RMF in the context of training simulations.
- Recommend changes or supplements to existing security policies to mitigate risks.
- Support implementation of JSIG or ICD 503 requirements including technical auditing.
- Ensure communication with ISSMs, cyber leaders, and program managers during ATO lifecycle.
- Provide oversight and execution of A&A processes.
- Recognized as highly skilled with advanced knowledge and experience in their technical/professional field, with the ability to apply relevant standards, procedures, and practices.
Qualifications: Education/Certifications/Experience/Skills:
- MA/MS Degree with 10 years of directly related experience or BA/BS with 12 years of directly related experience or 15 years of directly related experience to this discipline.
- Must possess and maintain a government security clearance at the Top Secret Level.
- Must be proficient in the use of Microsoft Office Applications and other standard applications.
- Be compliant with DoD 8570 IAM II with no waivers.
PE Systems, Inc. is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for Employment without regard to race/ethnicity, color, religion, sex, nation origin, ancestry, age, sexual orientation, gender identity, genetic information, marital status and disability (including physical or mental disability as well as pregnancy) veteran status or any other status protected by the Federal, State or local law. #cj
Equal Opportunity Employer This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights notice from the Department of Labor.
|