About The Position

KODA Technologies is seeking a Cyber Security Engineer/Information Systems Security Officer (ISSO) to support Systems Engineering Technical Assistance to the Ground-based Midcourse Dense (GMD) Product Office under the Teams-Next Missile Defense Systems Engineering (TN-MDSE) contract managed by the Missile Defense Agency.

Requirements

  • Bachelor's degree and 7+ years of related professional experience.
  • DoD 8570 compliant IAM Level II certification is required (Sec +)
  • Experience with DoD's RMF and SSP processes
  • Active Secret Clearance is required

Nice To Haves

  • Experience with MDA-specific RMF and SSP processes
  • Self-Motivated
  • Customer-oriented

Responsibilities

  • Serve as a member of the cybersecurity team, developing System Security Plans (SSPs), Interim Authority to Test (IATT), Authority to Connect (ATC), and Authority to Operate (ATO) packages.
  • Perform technical work utilizing the Risk Management Framework (RMF) process, including analyzing and solving Information Assurance (IA)-related technical problems.
  • Ensure that system security artifacts are developed, reviewed, and updated as needed.
  • Confirm all RMF requirements are properly addressed and required artifacts are loaded and managed within the Enterprise Mission Assurance Support Service (eMASS).
  • Ability to analyze complex problems, identify root causes, and develop actionable recommendations with effective solutions.
  • Interface with other cyber teams to review RMF Contract Data Requirements Lists (CDRLs) and ensure timely delivery of CDRL artifacts, while providing feedback to ensure the sufficiency and quality of cyber artifacts.
  • Periodically conduct a review of each system's audits and monitor corrective actions until allocations are closed.
  • Perform vulnerability/risk analyses of systems, drawing on expertise in relevant information systems security.
  • Track and monitor Plan of Action and Milestones (POA&Ms).
  • Conduct reviews of cybersecurity artifacts and technical briefings and work with the customer to resolve any findings.
  • Ensure that identified security controls are implemented and operating as intended through all phases of the lifecycle.
  • Track deliverables (i.e., artifacts, schedules, metrics).
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service