IA Cybersecurity Professional #3788

Careers

  • US-TX-Lackland AFB
  • Information Technology
Apply Now

Company Overview

GovCIO is a team of transformers—people who are passionate about transforming government I.T. We believe in making a difference by developing digital strategies and delivering the technology-related innovation governmental operations that improve the citizen experience every day.

But we can’t do it alone. We welcome and nurture an inclusive and diversified work culture. Because different backgrounds, experiences, abilities, and perspectives make us better decision-makers, problem solvers, and creators. We’re changing the face of I.T. – from our diverse staff to the end-products we develop. And we’re excited to expand our team. Are you ready to be a transformer?

Responsibilities

Designs, tests, and implements state-of-the-art secure operating systems, networks, and database products. Conducts risk assessments and provides recommendations for application design. Involved in a wide range of computer security issues including architectures, firewalls, electronic data traffic, and network access. Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research. Prepares security reports for government agencies.

1. Performs a wide range of computer security duties, including architectures, firewalls, electronic data traffic, and network access.
2. Participates in the certification and accreditation processes; performs technical vulnerability assessments of computer security.
3. Provides business continuity and disaster recovery support.
4. Engages in intrusion detection and prevention; provides incident reporting and response support.
5. Conducts ongoing monitoring of computer security requirements and compliance, maintains system security plans and risk mitigation plans.
6. Trains clients in proper computer security measures and prevention.

Specifically this position will:

– Provide SME support for all vulnerability and compliance scan tool applications and modules (pre-built and customized).

– Develop workflows and customize, implement, and maintain the aforementioned applications.

– Develop and update standard operating procedures (SOPs) and provide training on existing and new technologies to Government personnel. This is informal office training.

– Provide process and operations guides.

– Provide technical support in the daily operations and evaluation of existing security tools, products and future capabilities. Tools shall include, but are not limited to: Security Log Management, Account Management, Asset Management, Vulnerability Management, End Point Security, and any related network security tools. Current tool sets are: ArcSight, Directory Resource Administration (DRA), Automated Compliance Assessment Solution (ACAS), System Center Configuration Manager (SCCM), Tanium, Host Base Security System (HBSS) and Service Now.

– Maintain operational oversight and manage Command-level and privileged user accounts for the Enterprise using provided Enterprise tools.

– Prepare for and conduct customer briefings, attend and provide minutes on Technical Exchange Meetings (TEMs), and provide status reports on cybersecurity activities.

– Develop information systems security studies and reports that address areas of information system security concerns. Ensure cybersecurity requirements are incorporated in system development and sustainment activities. Provide consultant services in all areas of information system security, including: physical, administrative, personnel, computer, operations, and industrial security. Provide security documentation and reports within specified timeframes. (A013)

– Monitor and report, IAW IC Directives and AF BluSCI policy, the status of security measures established by the Director of National Intelligence (DNI) and related authorizing officials that protect and defend information and information systems, web-based services, remote hosted applications, discovery, storage, operating systems, public key infrastructure (PKI), and other information technology components and applications for the Enterprise.

– Maintain cybersecurity, system security, and sustainment programs. The contractor shall follow all applicable ICD and National Institute of Standards and Technology (NIST) guidance in performing day-to-day duties.

– Create, edit, and review security accreditation and authorization packages for the AF BluSCI Enterprise. Adhere to the RMF process.  Input data into appropriate A&A tool. The current toolset used is XACTA. Review logical network drawings, configurations, and control parameters to ensure they are current. Review documentation required to certify new hardware and software systems for deployment.

– Monitor and administer the vulnerability and compliance scan tool

– Review AF BluSCI change proposals for security, interoperability, accreditation and authorization issues or vulnerabilities.

– Perform vulnerability and compliance assessments. Conduct security tests and evaluations. Monitor and review Information Assurance Vulnerability Alerts (IAVA) and Information Assurance Vulnerability Bulletins (IAVB).

– Track and provide results to appropriate Government entity for review IAW standard operating procedures.

– Monitor and report mandated Federal Information Security Management Act (FISMA) statistics for the AF BluSCI Enterprise.

– Provide quarterly report to appropriate Government entity in accordance with IC Directives and AF BluSCI policy.

 

Qualifications

– Bachelor’s degree with 8 + years (or commensurate experience)
– Verified DoD Top Secret/SCI clearance eligibility on Day 1

– 3-5+ Years of experience with USAF A&A

– Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM) (covers Sec+)

– Strong understanding of RMF workflow tools like eMASS or Xacta

– Strong working knowledge of programs working within AF JWICS network rules and guides

– Experience with network management tools, network engineering principles, network analysis

– Expert understanding of A&A process

– Possess an expert understanding of current computer security requirement and compliance

– Expert ability to maintain System Security and Risk Mitigation plans
– Excellent written/verbal communications skills

 

#cjpost

COVID Policy: New employees will be required to adhere to the Company’s and its clients’ COVID-19 safety procedures. In the event that the COVID-19 vaccination mandate for Federal Contractors is enforced, you must become fully vaccinated or request and be approved for an exemption. Employees working onsite at a client location must comply with our client’s COVID-19 requirements.

GovCIO is a team of professionals who want to make a difference. And that can only happen with a diverse, happy, and cared-for team. So, we prioritize your well-being, equity for all and look for ways to make work a better place for each of us every day.

We are an Equal Opportunity Employer. All qualified applicants receive consideration for employment without regard to race, ethnicity, religious affiliation, gender, gender identity or expression, sexual orientation, national origin, or disability status. EOE AA M/ F/Vet/Disabled

Apply Now

Not The Right Fit?

Is this not the job you’re looking for? That’s ok! We’ve got plenty of other opportunities for you to peruse. Search all of our open positions by your area of interest or location.

View All Jobs