Salary
💰 $89,499 - $134,200 per year
About the role
- Perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy.
- Establish strict program control processes to ensure mitigation of risks and support obtaining certification and accreditation of systems.
- Assist in the implementation of the required government policy (i.e., NISPOM, DCID 6-3), make recommendations on process tailoring, and participate in and document process activities.
- Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards.
- Support the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports.
- Document the results of Certification and Accreditation activities and technical or coordination activity and prepare the system Security Plans and update the Plan of Actions and Milestones POA&M.
- Periodically conduct a complete review of each system's audits and monitor corrective actions until all actions are closed.
- Interface with Government customers and Northrop Grumman leadership on program initiatives and deliver status updates.
- Maintain and lead multiple complex efforts with multiple stakeholders and drive Cybersecurity requirements in an effort to further program initiatives.
- Oversee and coordinate with multiple site ISSO’s to ensure accurate Bodies of Evidence and support remote site needs.
- Drive a high level of standardization to maintain consistent compliance with JSIG and customer BoE requirements across remote sites.
Requirements
- Bachelor's degree with 2 years of Information Systems Security or related experience, or a High School diploma or equivalent with 5 years of Information Systems Security experience may be considered in lieu of a completed degree.
- Current DoD Secret level security clearance with an original adjudication, or a periodic reinvestigation date, completed within the last 6 years; maintaining the required security clearance will be a condition of continued employment.
- Ability to obtain a Special Access Programs (SAP/SAR) clearance within a reasonable period of time as determined by the company, and also by customer and/or program requirements; maintaining a SAP clearance will be a condition of continued employment.
- Current DoD 8570 IAT Level II security certification or equivalent is required to start (i.e Security + etc.)
- Demonstrated knowledge of Cybersecurity practices, network technologies, and system development life-cycles, in addition to an understanding of information technology infrastructure management/monitoring and applications.
- Travel to remote sites to around 35%-65% of the time (posting also notes Travel: Yes, 50% of the Time).
- Able to oversee and coordinate with multiple site ISSO’s to ensure accurate and a high standard of Bodies of Evidence.
- Demonstrated experience in proactive communications both to the remote sites as well as Remote Site Lead and Program ISSM.
- Able to drive a high level of standardization to maintain consistency in the remote sites compliance with JSIG and customer BoE requirements.
- U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
- Preferred: Experience reviewing and enforcing JSIG requirements for documenting Body of Evidence for Authority to Operate consideration.
- Preferred: Experience enforcing guidelines, monitoring policies, and enforcing standards for Cybersecurity frameworks and industry best practices supporting NIST SP 800-53, CNSSI 1253, and DoD Risk Management Framework (RMF).
- Preferred: Experience participating on or directly supporting teams performing inspection readiness/audit activities.
- Preferred: Experience leading and maintaining a strong Configuration Management program encompassing processes for software and hardware life cycle management.
- Preferred: Experience coordinating with a team to review and document information system changes.
- Preferred: Experience and working knowledge and understanding of auditing, vulnerability scanning/remediation, SIEMs, DISA STIGs, configuration/change control, and implementation of Risk Management Framework.
- Preferred: Strong verbal and written communication skills to produce coherent and concise documentation required for evaluation.