About The Position

Implementing and documenting management, operational, and technical NIST 800-53 security controls for aviation based information technology systems, platforms, and tactical communication equipment to achieve and maintain Authorization (ATO or IATT) under the Risk Management Framework (RMF) in accordance with DOD, Army, NETCOM, and organizational policies.

Requirements

  • Implementing and documenting management, operational, and technical NIST 800-53 security controls
  • Authorization (ATO or IATT) under the Risk Management Framework (RMF)
  • DOD, Army, NETCOM, and organizational policies
  • Formal testing requirements
  • Pre-test preparations
  • Participation in tests
  • Analysis of test results
  • Preparation of required reports
  • Preparation of Test Plans
  • Identification of cybersecurity concerns and risks
  • Documentation of effective mitigations
  • Identification of system/network deviations from acceptable configurations, enclave policy, or local policy
  • Updating and maintaining enterprise Mission Assurance Support System (eMASS) records
  • Creation or updating of system Authorization Boundary Diagrams
  • Creation or updating of Information or Data Flow Diagrams (ports, protocols, and services)
  • Creation or updating of Security Architectures
  • Ensuring IT systems, platforms, or applications can receive an IATT, ATO, or Assess Only Approval
  • Identification and documentation of deviations, vulnerabilities, and mitigations on the system Plan of Actions and Milestones (POA&M) in eMASS
  • Importing results from technical scans into eMASS
  • Managing POA&M items
  • Reviewing existing documentation and performing edits and updates
  • Reviewing, creating or updating DOD and RMF documentation (Security Plans (SP), Configuration Management Plans (CMP), Incident Response Plans (IRP), Contingency Plans (CP), Access Control Policies, and other Assessment & Authorization (A&A) artifacts)
  • Identification of applicable Security Technical Implementation Guide (STIG) and Security Requirements Guides (SRG)
  • Testing and applying STIGs and SRGs to system components
  • Using cybersecurity tools such as eMASS, SCAP Compliance Checker (SCC), ACAS/Nessus Vulnerability Scanner, Evaluate-STIG, eMASSter, DISA STIG Viewer
  • Selecting, justifying, and obtaining approval for impact levels for Confidentiality, Integrity, and Availability
  • Identifying and implementing applicable control overlays for system records
  • Providing network and security operations technical analysis, assessment, and recommendations
  • Performing detailed analyses to validate established security requirements
  • Recommending additional security requirements and safeguards
  • Establishing strict program control processes and policies
  • Mitigation of risks
  • Supporting obtaining certification and accreditation of systems
  • Advising leadership of security relevant changes
  • Supporting customer meetings
  • Supporting integrated product teams
  • Supporting test event planning
  • Providing cybersecurity support

Responsibilities

  • Supports the formal testing requirements through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports.
  • Prepares Test Plans and identifies cybersecurity concerns and risks associated with tests and documents effective mitigations.
  • Identifies where systems/networks deviate from acceptable configurations, enclave policy, or local policy, especially relating to test configurations and interconnections.
  • Updates and maintains enterprise Mission Assurance Support System (eMASS) records for information systems and platforms.
  • Creates or updates system Authorization Boundary Diagrams, Information or Data Flow Diagrams (ports, protocols, and services), and Security Architectures.
  • Ensures that assigned IT systems, platforms, or applications can receive an IATT, ATO, or Assess Only Approval.
  • Identifies and properly documents deviations, vulnerabilities, and mitigations on the system Plan of Actions and Milestones (POA&M) in eMASS, to include importing results from technical scans into eMASS and managing the resulting POA&M items.
  • Reviews existing documentation and performs edits and updates to ensure the applicable security controls continue to be met and remain effective.
  • Reviews, creates or updates a variety of DOD and RMF documentation (including but not limited to Security Plans (SP), Configuration Management Plans (CMP), Incident Response Plans (IRP), Contingency Plans (CP), Access Control Policies, and other Assessment & Authorization (A&A) artifacts) as needed.
  • Identifies the correct applicable Security Technical Implementation Guide (STIG) and Security Requirements Guides (SRG) for technologies used with systems and also test and apply them to the components of the information system.
  • Uses a variety of cybersecurity tools that include, but are not limited to, enterprise Mission Assurance Support System (eMASS), Security Content Automation Protocol (SCAP) Compliance Checker (SCC), Assured Compliance Assessment Solution (ACAS)/Nessus Vulnerability Scanner, Evaluate-STIG, eMASSter, DISA STIG Viewer, etc.
  • Selects, justifies, and obtains approval for the correct impact levels for Confidentiality, Integrity, and Availability as well as identify and implement applicable control overlays for system records.
  • Provides network and security operations technical analysis, assessment, and recommendations.
  • Performs detailed analyses to validate established security requirements and to recommend additional security requirements and safeguards.
  • Establishes strict program control processes and policies to ensure mitigation of risks and supports obtaining certification and accreditation of systems.
  • Advises appropriate leadership (e.g., Information System Security Manager, etc.) of security relevant changes affecting the organization’s cybersecurity posture.
  • Supports customer meetings, integrated product teams, test event planning, providing cybersecurity support as needed.

Benefits

  • employee-centric culture
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service