This position requires a current Top Secret/SCI clearance. The Cybersecurity Specialist will partner with the security team, program, and government customers to perform as an Information Systems Security Officer (ISSO). In this role you will: Oversee day-to-day information system (IS) security operations including hardware and software implementations. Fulfill appointed Media Custodian role as requested/directed by the customer. Carry out technical administration of IS in accordance with internal LM and customer security requirements, primarily RMF. Auditing of the IS. Upkeep, monitor, analyze, and respond to network and security events. Document compliance actions within the approved automated compliance tracking system or develop a plan of actions and milestones (POA&M) with the Information Systems Security Manager (ISSM) to address non-compliance in the allotted time frame. Ensure systems are operated, maintained, and disposed of in accordance with internal security policies and practices outlined in the security plan. Ensure configuration management (CM) for security-relevant IS software, hardware, and firmware is maintained and documented in accordance with baseline. Ensure all information system security-related documentation is current and accessible to properly authorized individuals. Ensure records are maintained for workstations, software, servers, routers, firewalls, network switches, telephony equipment, etc. throughout the information system's life cycle. Evaluate proposed changes or additions to the information system, and advise the ISSM of their security relevance. Assist and conduct security IS education. Participate in internal/external security audits/inspections; perform risk assessments. Inform ISSM on technical IS security matters. Assist in conducting investigations of computer security violations and incidents, reporting as necessary to both the Program Security and Program Managers. Ensure proper protection and/or corrective measures have been taken when an incident or vulnerability has been discovered. Communicate, implement and manage a formal Information Security/Information Systems Security Program together with ISSM and Program Security. Implement and enforce Information Security Policies and Procedures together with ISSM and Program Security. Review and oversee RMF Package authorizations with the ISSM.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Industry
Transportation Equipment Manufacturing
Number of Employees
5,001-10,000 employees