Will work with Information Systems Security Manager (ISSM) to create and maintain Assessment and Authorization (A&A) documentation, including the system security plan, security control assessment, plan of action and milestones to support Authorization to Operate decisions. Capture and refine information security requirement for new systems or for enhanced functionality on existing systems. Provide support for proposing, coordinating, implementing and enforcing information systems security policies, standards and methodologies. Your talents, perspectives, and efforts will contribute directly to the safeguarding of valuable intelligence systems and data, ensuring positive mission outcomes. This position is located in Boulder, Colorado and requires level of effort across multiple domains and security levels.
Support Space Systems Command (SSC), Space Sensing Tools Application & Processing (TAP) Lab in Boulder, CO and integration support to the Overhead Persistent Infrared (OPIR) Battlespace Awareness Center (OBAC) at Buckley SFB, Aurora, Colorado.
Duties to include, but are not limited to:
- Ensuring the cybersecurity architecture and design of the customer’s systems are functional and secure with the ability to identify, protect, detect, respond and recover from cyber-attack
- Developing and sustaining enterprise RMF accreditation packages, from concept development and contract pre-acquisition through contractor design and accreditation
- Experience in Developing and Sustaining Cloud environments from concept development and contract pre-acquisition through contractor design and accreditation
- Providing Information System Security Operations support, integration services, technical assessments, and solutions to enable cybersecurity and DCO
- Applies a combination of expert engineering knowledge of security solutions to design, develop and/or implement solutions to ensure they are consistent with enterprise architecture security policies and support full spectrum military cyberspace operations
- Overseeing system and network designs that encompass multiple computer and network devices to include those with differing data protections/classification requirements
- Developing Defensive Cyberspace Operations and incident Response Tactics, Techniques and Procedures to monitor and protect the system from cyber-attacks
- Apply Secure Technical Implementation Guide (STIG) best practices to classified and unclassified information systems, networking equipment, and applicable software/applications
- Information Security interface to government customer and approving authorities across the DoD and Intelligence Communities
- Perform vulnerability/risk assessment analysis to support authorization and accreditation
- Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Authorization To Operate (ATO) packages, policies and Security Controls Traceability Matrices (SCTMs)
- Conduct periodic reviews and evaluations of required IS policies and procedures
- Support IS Security Inspections, tests, and reviews