Cybersecurity, Journeyman ISSO

Torch Technologies, Inc.
1dOnsite

About The Position

Torch Technologies is seeking a Cybersecurity Journeyman (ISSO) located at Maxwell Air Force Base-Gunter Annex in Montgomery, AL, within the AFLCMC/GB Business and Enterprise Systems Directorate (BES), to support the Enterprise Resource Planning (ERP) Common Services (CS). ERP Common Services is responsible for establishing, integrating, and sustaining common engineered infrastructure and services capabilities across the Air Force’s ERP applications. ERP CS supports the deployment of the Air Force Integrated Personnel and Pay System (AFIPPS-ACAT I), Defense Enterprise Accounting Management System (DEAMS-ACAT I) and Maintenance, Repair and Overhaul Initiative (MROi-BCAT II). As a Cybersecurity, Journeyman ISSO your duties will include the following, but are not limited to: Implements and enforce all AF cybersecurity policies, procedures, and countermeasures; Completes and maintains required cybersecurity certification IAW AFMAN 17-1303; Ensures all users have the requisite security clearances and need-to-know, complete annual cybersecurity training, and are aware of their responsibilities before being granted access to the IT according to AFMAN 17-1301; Maintains all authorized user access control documentation IAW the applicable AF Records Information Management System; Ensures software, hardware, and firmware complies with appropriate security configuration guidelines, e.g., security technical implementation guides/security requirement guides; Ensures proper configuration management procedures are followed prior to implementation and contingent upon necessary approval; Coordinate changes or modifications with the system-level ISSM, SCA, and/or the Wing Cybersecurity office; Initiates protective or corrective measures, in coordination with the ISSM, when a security incident or vulnerability is discovered; Reports security incidents or vulnerabilities to the system-level ISSM and wing cybersecurity office according to AFI 17-203, Cyber Incident Handling; Initiates exceptions, deviations, or waivers to cybersecurity requirements

Requirements

  • U.S. Citizenship
  • Bachelor’s Degree in a related field and at least 3 years of progressive experience in systems administration, IT or cybersecurity OR, Seven years of directly related experience with proper certifications, five of which must be in the DoD.
  • Risk Management Framework, eMASS, Authority to Operate, provide the PMO/Capability Development Manager (CDM) cybersecurity support per DoDI 8500.01 is required.
  • Support includes assessing and continuously monitoring cybersecurity risk ensuring that legacy and new capabilities adhere to enterprise standards such as Risk Management Framework (RMF), Cybersecurity Framework (CSF), and National Institute of Standards and Technology (NIST) and per Authorization Official’s Information System’s Continuous Monitoring (ISCM) strategy.
  • The ISSO is required to hold and maintain a personnel certification associated with the DCWF ISSO work role (722) at an intermediate (journeyman) proficiency level as outlined in DoDI 8510.01, AFMAN 17-1305 and AFI 17-101 for assigned systems/applications.
  • Must have an active DoD security clearance at the Secret level.
  • Must maintain clearance at required level.

Nice To Haves

  • Cloud experience (OCI)
  • Atlassian Tool suite
  • Agile Development methodologies
  • ServiceNow

Responsibilities

  • Implements and enforce all AF cybersecurity policies, procedures, and countermeasures
  • Completes and maintains required cybersecurity certification IAW AFMAN 17-1303
  • Ensures all users have the requisite security clearances and need-to-know, complete annual cybersecurity training, and are aware of their responsibilities before being granted access to the IT according to AFMAN 17-1301
  • Maintains all authorized user access control documentation IAW the applicable AF Records Information Management System
  • Ensures software, hardware, and firmware complies with appropriate security configuration guidelines, e.g., security technical implementation guides/security requirement guides
  • Ensures proper configuration management procedures are followed prior to implementation and contingent upon necessary approval
  • Coordinate changes or modifications with the system-level ISSM, SCA, and/or the Wing Cybersecurity office
  • Initiates protective or corrective measures, in coordination with the ISSM, when a security incident or vulnerability is discovered
  • Reports security incidents or vulnerabilities to the system-level ISSM and wing cybersecurity office according to AFI 17-203, Cyber Incident Handling
  • Initiates exceptions, deviations, or waivers to cybersecurity requirements

Benefits

  • ESOP participation
  • 401(k) match and safe-harbor contribution
  • medical, dental, vision, life insurance
  • short-term disability
  • long-term disability
  • flexible spending accounts
  • Health Saving Accounts and Health Reimbursement Accounts
  • EAP
  • education assistance
  • paid time off
  • holidays
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service