Participate in the implementation of current and future security domains (i.e. DevSecOps, AI, Cloud Computing, etc.) Develop, implement, and maintain system documentation for information system authorization, security management, and continuous monitoring (CONMON) of both networked and standalone information systems (i.e., Authorization to Operate (ATO), System Security Plan (SSP), Plans of Actions and Milestones (POAM), etc.) Validate that systems are reporting properly to security management systems (e.g., XACTA, eMASS, etc.) Validate that monthly security scans performed by systems administrator comply with NSA/CSS Policy Instruction 6-008 Coordinate with system administrator on submissions of Change Logs and/or Modifications to the baseline in order to maintain accurate baseline Configuration Management (CM) Validate Information System Owner (ISO)-submitted annual Inventory Review system documentation to include Configuration Guides, Standard Operating Procedures, Training Materials, Install Guides, Troubleshooting Guides, etc. Validate maintained inventory of Software products are properly licensed Validate that systems are properly registered with NSA DNS by systems administrators Coordinate Risk Management Framework (RMF) Control responsibilities and inheritance Coordinate with ISO, ISSM, and ISSO personnel to ensure cybersecurity policy and procedure compliance Validate appropriate user agreements are executed by systems administrator on behalf of PMO Coordinate with PMO to provide updated TEMPEST/SCIF accreditation letters for the SCIFs