Cyber SecurityFirewallsCLeadershipRisk ManagementDecision Making
About this role
Role Overview
Maintaining the overarching operational security posture and managing the day-to-day security operations of your assigned Information System (IS);
Developing, reviewing, and maintaining security and authorization documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs);
Performing vulnerability/risk assessment analyses to support assessment and authorization (A&A);
Ensuring the implementation and maintenance of security controls in accordance with the SSP and the organization's security policies, standards, and procedures;
Supporting security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).
Providing configuration management (CM) for IS security software, hardware, and firmware, and leading Change Control Board (CCB) meetings; and,
Providing guidance and security expertise to program leadership.
Requirements
Experience with and knowledge of Federal DevSecOps frameworks and processes
CISM and/or CISSP cert is required
Experience with IS accreditors, policies, and procedures to support Authoriy to Operate (ATO)/Authority to Connect (ATC) decision making and operational practices.