Cyber Security RMF Support

SAICEl Segundo, CA
1dOnsite

About The Position

SAIC is seeking a Cyber Security RMF Support Engineer, to work in El Segundo, Ca;you will join a systems engineering team defining the next generation of space communication systems supporting US Space Force (USSF) satellite communications. You will support Systems Engineering & Integration (SE&I) activities in a multidisciplinary and collaborative environment. You will interface and collaborate with SE&I team members, contractors, government civilians and members of the USSF. You will lead and support several working groups responsible for leading technical discussion, resolve and identify risk, requirement gaps, developing briefings, writing, and tracking action items, and authoring meeting minutes. The MILSATCOM Systems Engineering, Integration, and Test (MSEIT) effort provides leading edge Systems Engineering & Integration (SE&I) for the US Space Force’s Space Systems Center (SSC). We support the Space Force’s acquisition of state-of-the-art satellite communications systems, providing global security, survivability, and protected communications for our nation’s warfighters. We seek technical individuals who will thrive in a highly collaborative work environment of small teams, using the most modern tools and methodologies to tackle the challenges of integrating complex space and ground communications system. Key Responsibilities: Support the SSC with ensuring security, quality, timeliness, mission partner support, completeness, and regulatory compliance of ATO RMF documentation. Experience creating, editing and reviewing RMF, policy documents to implement administrative controls for each of the Rev 5 control families. Experience developing and reviewing and performing self-assessments of control narratives and System Control Traceability Matrix (SCTM). Experiencing reviewing and editing ATO artifacts such as Ports, Protocol and Services, matrix and Hardware/Software lists. Proposing, coordinating, implementing, and enforcing all Department of the Air Force information system security policies, standards, and methodologies. Familiarity with vulnerability assessments using the Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG), and the Security Content Automation Protocol (SCAP) Compliance Checker, incorporating automated Benchmarks Knowledge of evaluating operating systems and network devices security configuration in accordance with Defense Information Systems Agency (DISA) approved Security Technical Implementation Guides Performing security control continuous monitoring, security audits, risk analysis and developing mitigation strategies for DoD information systems. Ensures software, hardware, and firmware complies with appropriate security configuration guidelines (e.g., security technical implementation guides /security requirement guides). Ensures proper configuration management procedures are followed prior to implementation and contingent upon necessary approval. Coordinate changes or modifications with the system-level Information System Security Manager (ISSM), Security Control Assessor (SCA), and/or the Wing Cybersecurity office. During system development, recommends protective or corrective measures, in coordination with the ISSM, when a security incident or vulnerability is discovered. During system development, reports security incidents or vulnerabilities to the system-level ISSM and wing cybersecurity office according to AFI 17-203, Cyber Incident Handling. Recommends exceptions, deviations, or waivers to cybersecurity requirements. Preparing certification letters and Memoranda of Agreement (MoA), Authorization to Connect (ATC) packages, Interconnection Security Agreement (SIA), and Security Impact Assessments with system owners for interface. Support the following responsibilities\: security control assessor (SCA) and Security Technical Implementation Guide (STIG) curated to DOD/DAF/USSF baselines, audit standards, and plan of actions and milestones (POAM). Attend cleared expert threat briefings; have oversight of security program design, incident response plans, cyber risk assessments, and attack surface assessments; investigate security breaches, perform red, blue, purple, ethical hacking, orchestrate vulnerability assessment, develop security protocols, conduct tabletop exercises, and breach readiness reviews. Completes and maintains required cybersecurity certification in accordance with (IAW) AFMAN 17-1303. SAIC accepts applications on an ongoing basis and there is no deadline. SAIC® is a premier Fortune 500® mission integrator focused on advancing the power of technology and innovation to serve and protect our world. Our robust portfolio of offerings across the defense, space, civilian and intelligence markets includes secure high-end solutions in mission IT, enterprise IT, engineering services and professional services. We integrate emerging technology, rapidly and securely, into mission critical operations that modernize and enable critical national imperatives. We are approximately 24,000 strong; driven by mission, united by purpose, and inspired by opportunities. SAIC is an Equal Opportunity Employer. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $7.5 billion. For more information, visit saic.com . For ongoing news, please visit our newsroom .

Responsibilities

  • Support the SSC with ensuring security, quality, timeliness, mission partner support, completeness, and regulatory compliance of ATO RMF documentation.
  • Experience creating, editing and reviewing RMF, policy documents to implement administrative controls for each of the Rev 5 control families.
  • Experience developing and reviewing and performing self-assessments of control narratives and System Control Traceability Matrix (SCTM).
  • Experiencing reviewing and editing ATO artifacts such as Ports, Protocol and Services, matrix and Hardware/Software lists.
  • Proposing, coordinating, implementing, and enforcing all Department of the Air Force information system security policies, standards, and methodologies.
  • Familiarity with vulnerability assessments using the Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG), and the Security Content Automation Protocol (SCAP) Compliance Checker, incorporating automated Benchmarks Knowledge of evaluating operating systems and network devices security configuration in accordance with Defense Information Systems Agency (DISA) approved Security Technical Implementation Guides
  • Performing security control continuous monitoring, security audits, risk analysis and developing mitigation strategies for DoD information systems.
  • Ensures software, hardware, and firmware complies with appropriate security configuration guidelines (e.g., security technical implementation guides /security requirement guides).
  • Ensures proper configuration management procedures are followed prior to implementation and contingent upon necessary approval.
  • Coordinate changes or modifications with the system-level Information System Security Manager (ISSM), Security Control Assessor (SCA), and/or the Wing Cybersecurity office.
  • During system development, recommends protective or corrective measures, in coordination with the ISSM, when a security incident or vulnerability is discovered.
  • During system development, reports security incidents or vulnerabilities to the system-level ISSM and wing cybersecurity office according to AFI 17-203, Cyber Incident Handling.
  • Recommends exceptions, deviations, or waivers to cybersecurity requirements.
  • Preparing certification letters and Memoranda of Agreement (MoA), Authorization to Connect (ATC) packages, Interconnection Security Agreement (SIA), and Security Impact Assessments with system owners for interface.
  • Support the following responsibilities\: security control assessor (SCA) and Security Technical Implementation Guide (STIG) curated to DOD/DAF/USSF baselines, audit standards, and plan of actions and milestones (POAM).
  • Attend cleared expert threat briefings; have oversight of security program design, incident response plans, cyber risk assessments, and attack surface assessments; investigate security breaches, perform red, blue, purple, ethical hacking, orchestrate vulnerability assessment, develop security protocols, conduct tabletop exercises, and breach readiness reviews.
  • Completes and maintains required cybersecurity certification in accordance with (IAW) AFMAN 17-1303.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service