Torch Technologies has an exciting opportunity for a Cybersecurity Engineer (ISSO) Journeyman located Kettering, OH (Dayton/WPAFB area) to support our EPASS GB contract. As part of the AFLCMC/GB Business and Enterprise Systems Directorate (BES), the Acquisition and Due-In System (ADIS) is an unclassified legacy mainframe system. It provides a single repository of information for items centrally procured at the Air Logistics Centers (ALCs). ADIS maintains and processes data for contracting and procurement requirements activities from Purchase Request (PR) initiation (pre-award) through the contract lifecycle to closeout (post-award) and maintains historical data on stock numbered items. As a Cybersecurity Engineer (ISSO) Journeyman your duties will include the following, but are not limited to: Provide the PMO/Capability Development Manager (CDM) cybersecurity support per DoDI 8500.01. Support includes assessing and continuously monitoring cybersecurity risk ensuring that legacy and new capabilities adhere to enterprise standards such as Risk Management Framework (RMF), Cybersecurity Framework (CSF), and National Institute of Standards and Technology (NIST) and per Authorization Official’s Information System’s Continuous Monitoring (ISCM) strategy. Responsible for ensuring the appropriate operational security posture is maintained for the assigned IT. Implements and enforce all AF cybersecurity policies, procedures, and countermeasures. Completes and maintains required cybersecurity certification IAW AFMAN 17-1303. Ensures all users have the requisite security clearances and need-to-know, complete annual cybersecurity training, and are aware of their responsibilities before being granted access to the IT according to AFMAN 17-1301. Maintains all authorized user access control documentation IAW the applicable AF Records Information Management System. Ensures software, hardware, and firmware complies with appropriate security configuration guidelines, e.g., security technical implementation guides/security requirement guides. Ensures proper configuration management procedures are followed prior to implementation and contingent upon necessary approval. Coordinate changes or modifications with the system-level ISSM, SCA, and/or the Wing Cybersecurity office. Initiates protective or corrective measures, in coordination with the ISSM, when a security incident or vulnerability is discovered. Reports security incidents or vulnerabilities to the system-level ISSM and wing cybersecurity office according to AFI 17-203. Initiates exceptions, deviations, or waivers to cybersecurity requirements.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level