EPASS GBS.022 Cybersecurity (ISSO) - Journeyman
Job description
Within the AFLCMC/GB Business and Enterprise Systems Directorate (BES) located at Wright-Patterson Air Force Base in Dayton, OH. The Purchase Request Process System (PRPS) automates the front-end of the Buy and Repair Acquisition process with a web-based, paperless link to contracting. PRPS performs competition screening and generates electronic Purchase Requests (PRs), Military Interdepartmental Purchase Requests (MPIRs) and Delivery Order Requests (DORs) including the appropriate attachments. The system obtains funding certification in support of the acquisition process via an automated interface, tracks lead time and produces item history.
ESSENTIAL DUTIES/POSITION DESCRIPTION:
The successful candidate will provide the PMO/Capability Development Manager (CDM) cybersecurity support per DoDI 8500.01. Support includes assessing and continuously monitoring cybersecurity risk ensuring that legacy and new capabilities adhere to enterprise standards such as Risk Management Framework (RMF), Cybersecurity Framework (CSF), and National Institute of Standards and Technology (NIST) and per Authorization Official’s Information System’s Continuous Monitoring (ISCM) strategy.
The Information System Security Officer (ISSO) is responsible for ensuring the appropriate operational security posture is maintained for the assigned IT. This includes the following related to maintaining situational awareness and initiating actions to improve or restore cybersecurity posture:
- Implements and enforce all AF cybersecurity policies, procedures, and countermeasures.
- Completes and maintains required cybersecurity certification IAW AFMAN 17-1303.
- Ensures all users have the requisite security clearances and need-to-know, complete annual cybersecurity training, and are aware of their responsibilities before being granted access to the IT according to AFMAN 17-1301.
- Maintains all authorized user access control documentation IAW the applicable AF Records Information Management System.
- Ensures software, hardware, and firmware complies with appropriate security configuration guidelines, e.g., security technical implementation guides/security requirement guides.
- Ensures proper configuration management procedures are followed prior to implementation and contingent upon necessary approval.
- Coordinate changes or modifications with the system-level ISSM, SCA, and/or the Wing Cybersecurity office.
- Initiates protective or corrective measures, in coordination with the ISSM, when a security incident or vulnerability is discovered.
- Reports security incidents or vulnerabilities to the system-level ISSM and wing cybersecurity office according to AFI 17-203, Cyber Incident Handling; and,
- Initiates exceptions, deviations, or waivers to cybersecurity requirements.
Job Requirements:
The Information Systems Security Officer (ISSO) has the knowledge, experience and demonstrated ability to perform tasks related to the technical/professional discipline they are performing. Typically works independently and applies the proper procedures and processes related to their area of expertise. Has the ability to problem solve and troubleshoot various situations to develop successful outcomes within established program/project guidelines. Work is performed independently or under the oversight of more senior contractor employees (Program Office and Staff Level Support interface).
All Cybersecurity professionals should possess experience providing guidance on the following to include, but not limited to:
Access control.
Configuration management.
System and communications protection.
Contingency planning.
Incident handling.
System and information integrity.
Security and privacy training and awareness; and,
Software development activities, software and tools related to Cybersecurity.
Experience performing cybersecurity duties as outlined in DoDI 8500.01, AFI 17-130, and AFI 17-1301 for assigned AF IT.
Experience validating, evaluating and analyzing finding results and developer adjudications using automated testing tools, e.g., Fortify, Checkmarx, SonarQube, and AppScan.
Experience utilizing DoD tracking systems to input/document cybersecurity deficiencies, vulnerabilities, and change requests in the appropriate tracking system for each program, e.g., Jira, HP ALM, and eMASS.
Experience with conducting information security continuous monitoring (ISCM) by maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions IAW approved ISCM strategy.
EDUCATION:
Bachelor’s or Master’s Degree in a related field and at least three years of experience in the respective technical/professional discipline being performed, three of which must be in the DoD OR, seven years of directly related experience with proper certifications, five of which must be in the DoD.
CERTIFICATION REQUIREMENTS:
At a minimum, the successful candidate will meet the requirements for and maintain a DoD 8570.01 IAT Level II Cybersecurity certification by possessing one of the following certifications:
Cisco CCNA Security
CompTIA CSA+/CySA+
GIAC GICSP
CompTIA Security+ CE
(ISC)2 SSCP
GIAC GSEC
EC-Council CND
OTHER QUALIFICATIONS:
Candidate must be a US Citizen
Candidate must possess and be able to maintain a T3/Secret Clearance
arclintfl.com is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, arclintfl.com provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, arclintfl.com is the ideal place to find your next job.