Work across program lifecycles to design, evaluate, and integrate cyber-resilient solutions into special warfare, rotary
and fixed-wing, and other weapon systems.
Provide expert-level evaluation of designs and proposed implementation solutions to defend weapon systems against malicious and non-malicious exploitation.
Translate operational, safety, and mission assurance requirements into practical system security engineering (SSE) approaches and implementation guidance based on NIST 800-53.
Evaluate designs and vendor solutions for security posture, Supply Chain Risk Management (SCRM), and operational impact; recommend mitigations and trade-offs to program teams.
Assist Program Offices in developing Program Protection Plans (PPP), Anti-Tamper (AT) approaches, Interface Control Documents (ICDs), and secure architecture diagrams.
Ensure cyber requirements are captured in Statements of Work (SOW), Contract Deliverable Requirements Lists (CDRLs), and technical evaluations of vendor proposals.
Provide proactive engineering solutions for continuous monitoring, secure communications, and mission continuity during degraded/contested environments.
Institutionalize tools/processes and coach program teams to sustainably implement cyber best practices across the directorate.
RMF / Assessment & Authorization (A&A) — 25%
Apply RMF to develop A&A packages (IATT, ATC, ATO) and continuous monitoring plans; coordinate artifacts with ISSMs, AOs, and higher headquarters.
Conduct system-level threat and vulnerability assessments, develop residual risk recommendations, and brief findings to program leadership and authorizing officials.
Support testing/assessment activities and closure of cybersecurity findings using risk-based prioritization.
Stakeholder engagement and leadership
Coordinate across Program Offices, ISSMs, Aircraft AOs, PEO staff, MAJCOM/Center leadership, and external vendors to align engineering solutions with policy and operational needs.
Provide timely, clear risk-communication and decision-support to senior DoD/AF leadership; be coachable and able to coach technical teammates.
Actively participate in cross-program working groups and IPTs to share lessons learned and drive repeatable cyber-resilient practices.
Requirements
Must be a US citizen
Must have an active Top Secret level clearance, with willingness to obtain SCI
IAT Level II (Security+ CE or other) certification
High School Diploma
(15) or more years relevant experience, eight (8) of which must be within the DoD
Demonstrated hands-on experience with the Risk Management Framework (RMF) and generating A&A artifacts (IATT, ATC, ATO)
Proven systems security engineering experience applying NIST SP 800-53 controls to weapon system architectures
Experience creating or reviewing Program Protection Plans (PPP) and Anti-Tamper considerations