• SME III (Cybersecurity)

    Job Locations US-CO-Colorado Springs
    Job ID
    2018-2260
    Category
    Engineering
    Clearance Level
    TS/SCI
  • Overview

    USfalcon, Inc., recognized as one of the fastest growing, privately held companies in the United States, is seeking an Subject Matter Expert III (Cybersecurity) to work out of Colorado Springs and Schriever Air Force Base, CO.

    The purpose of this position is to plan, design, implement, maintain, and report on the cybersecurity requirements for both deployed systems and those undergoing development for the Space and Missile Systems Center, Range and Networks Systems Division (SMC/RN).

    Responsibilities

    • Provide technical direction and guidance on the application of cybersecurity requirements and the - Risk Management Framework for cybersecurity Assessment and Authorization (A&A). Conduct cybersecurity risk assessments of USAF information systems, platform Information Technology (IT), IT services and/or IT products
    • Leads efforts that require cybersecurity engineering for problem definition, analysis, requirements development and implementation for complex systems. Serve as key coordinator among multiple project teams to ensure enterprise-wide integration of cybersecurity efforts
    • Provide expertise and assistance in vulnerability analysis, testing, risk mitigation, remediation, secure coding practices, trusted systems and networks, secure architectures, and penetration testing/response team tools and techniques
    • Participates in efforts that develop recommendations and advice on system development, improvements, optimization and support efforts. Interfaces with contractor and government personnel and other domain/functional experts. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners. Reports in writing and orally to contractor management and government representatives
    • Serves as subject matter technical expert in cybersecurity. Provides guidance to the technical staff on the functional procedures/processes/policies reflecting detailed knowledge of functional areas. Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents. Review program-unique specifications to include system specifications, development specifications and product specifications for both hardware and software, for proper format, content and compliance with program requirements and appropriate standards
    • Review, prepare, and update system accreditation packages and CDRLs. Notify customer/authorities when changes occur that might affect system accreditation/certification. Perform site self-inspections, provide security coordination and review of system test plans. Conduct site surveys at subordinate facilities and create/gather pertinent security documentation for inclusion into system accreditation packages. Coordinate, prepare, and track inspections, reports, and responses. Ensure system and network nodes are operated, maintained, and disposed of in accordance with security policies and practices. Perform Information System Security Manager (ISSO) duties in support of in-house and external customers
    • Develops, provides recommendations, and implements Standard Operating Procedures (SOPs), Program Protection Plans, Continuity of Operations / Disaster Recovery Plans, Configuration Management Plans, Vulnerability Management and Continuous Monitoring Plans, Incident Response Plans, cybersecurity reporting processes and procedures; System Plan of Action and Milestones (POA&M), PPS (Ports, Protocols & Services) worksheets, Network Diagrams, Security Control Traceability Matrix (SCTM)
    • Assesses systems for vulnerabilities using automated (ACAS, DISA SCAP Compliance Checker, Syslog) and manual methods and takes actions necessary to track, manage and report compliance with US Cyber Command (USCYBERCOM) directions and task orders (TASKORDS) and Air Force NOTAMs. Actively participates in Vulnerability Management Plan activities, discussions and planning meetings
    • Monitors systems for security status and health. Reviews system event logs. Conducts vulnerability scans and remediates findings. Implements, maintains and monitors host-based intrusion protection/prevention software. Reports anomalies, alerts, unauthorized activity, and any cyber events or incidents
    • Supports cyber incident handling operations to minimize potential loss, compromise and destruction of data and restoration of services
    • Additional duties as assigned.

    Qualifications

    Required Skills:

    • Ten (10) to fifteen (15) years of cybersecurity experience

    • At least eight (8) years of technical experience directly related to the required area of expertise, such as System Administration, Security Administration, Cybersecurity, Software development, network administration

    • Candidate shall possess appropriate certification per DoD 8570.01-M for Information Assurance Technician Level 2

       

    Desired Skills:

    • Knowledge of systems engineering in support of system definition, development, integration, verification methods, sustainment, risk modeling/simulation, test and evaluation, interoperability requirements across a wide range of hardware and software systems
    • Demonstrated technical leadership and DoD acquisition experience
    • Experience with United States Air Force (USAF) software certification requirements
    • Experience supporting multi-level systems and cross domain accreditation experience

     

    Education:

    • Bachelor's degree in Businees, Computer Science or Engineering from an accredited institution

     

    Clearance:

    • Final Top Secret/SCI Security clearance

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed