About the Role
<p class="p1">Ensures the rigorous application of cybersecurity policies, principles, and</p>
<p class="p1">practices in the delivery of all Information Technology (IT) and cybersecurity</p>
<p class="p1">services. Develops and designs security solutions to maintain confidentiality,</p>
<p class="p1">integrity, and availability of information throughout the enterprise. Identifies,</p>
<p class="p1">plans, and documents improvements to security controls. Develops and</p>
<p class="p1">documents recommendations and courses of action (COAs) to solve complex</p>
<p class="p1">cybersecurity problems. Develops and interprets cybersecurity requirements</p>
<p class="p1">and assists in the formulation of cybersecurity/IT budgets. Plans and</p>
<p class="p1">schedules the installation of new or modified security hardware, operating</p>
<p class="p1">systems, and software applications. Ensures the assessment and</p>
<p class="p1">implementation of identified computer and network environment fixes as part</p>
<p class="p1">of the Cybersecurity Vulnerability Management program. Guides the</p>
<p class="p2">You will:</p>
<p class="p2">Maintaining the appropriate operational security posture for an</p>
<p class="p2">information system</p>
<p class="p2">Manage the security of the information system through Certification &</p>
<p class="p2">Accreditation (C&A)</p>
<p class="p2">Support the information system owner for the completion of security</p>
<p class="p2">related responsibilities.</p>
<p class="p2">Review System Security Plans (SSP) and solutions</p>
<p class="p2">Recommend security mechanism implementations</p>
<p class="p2">Evaluate and document the effectiveness of solutions implemented to</p>
<p class="p2">provide the "CIA Triad"</p>
<p class="p2"><span style="text-decoration: underline;">Requirements:</span></p>
<p class="p2">Minimum 5 (five) years of experience with cybersecurity or information</p>
<p class="p2">assurance</p>
<p class="p2">Minimum of Bachelor’s Degree in a technical or business discipline from</p>
<p class="p2">an accredited college or university in Computer Science, Cybersecurity,</p>
<p class="p2">Computer Engineering, or related discipline</p>
<p class="p3"><span style="text-decoration: underline;">Position Specific Requirements</span></p>
<p class="p4"> </p>
<p class="p2"> <span style="text-decoration: underline;">CAP, CASP+ CE,</span></p>
<p class="p2"><span style="text-decoration: underline;">CISM, CISSP (or Associate), GSLC, CCISO - (minimum DoD 8570 IAM</span></p>
<p class="p2"><span style="text-decoration: underline;">Level II Certification)</span></p>
<p class="p2"><span style="text-decoration: underline;">Must know Risk Management Framework (RMF)</span></p>
<p class="p2"><span style="text-decoration: underline;">Active TS/SCI + Polygraph</span></p>
<p class="p2"><strong>Preferred / Desired Skills</strong>:</p>
<p class="p2">Experience with DoD Cybersecurity Policies</p>
<p class="p2">Experience with Xacta Solutions (Xacta 360)</p>
<p class="p2">Knowledge of Enterprise Mission Assurance Support Service (eMASS)</p>
<p class="p2">Experience with Zero Trust</p>
<p class="p2">Exposure to AWS (Amazon Web Services), ACAS (Security scanning</p>
<p class="p2">software), vCenter, WSUS (Windows Server Update Service), and/or</p>
<p class="p2">STIGs/IAVA</p>
<p class="p2">A problem solver who can get in, be given a project, and use engineering</p>
<p class="p2">skills to determine a solution</p>
<p class="p2">Able to build systems from the ground up – network architecture/systems</p>
<p class="p2">engineering</p>
<p class="p2">Location: Fort Meade/Columbia, MD (Customer Site - CANX)</p>