Logo
P E Systems (VA)

Principal Cyber Security Specialist - PR

P E Systems (VA), Ohio City, Ohio, United States, 45874


P E Systems, Inc.

has a great opportunity for a

Principal Cyber Security Specialist

supporting the

Agile Combat Support Program Office

at

WPAFB, OH.

P E Systems, Inc. genuinely cares about their employees. We bring together the best people and the best careers. Our family of talented and focused professionals enjoy P E Systems’ generous PTO and Holidays, great benefits and great pay.

Voted Best Places to Work in Dayton!

GENERAL FUNCTION:Assist the USG to organize, coordinate, identify, and satisfy the IA/ Cybersecurity requirements consistent with DoD policies, standards, and system architectures.Assist in formulating architectural design, functional specifications, interfaces and documentation of hardware or software systems.Shall of an advanced understanding of the Risk Management Framework (RMF) process and be able to utilize the RMF to support Authorization and Accreditation (A&A) of assigned systems.Assist with the development of specific artifacts for program reviews and the review of IA requirements in the development and assessment of RFPs and ECPs.Assist with the evaluation of technical implementations of security designs to ensure that security software, hardware, and firmware features affecting confidentiality, integrity, availability, accountability, and non-repudiation have been implemented as required.Shall have a working knowledge of telecommunications concepts and principles, operating modes, systems, media, equipment, equipment configuration, and related software systems, processes and procedures to assess and advise on vulnerability to attack from a variety of sources (e.g., espionage, disruption of services, destructive programs/applications) and procedures and methods for protection of systems and applications.Apply understanding of computer science principles, information management principles, automated data processing (ADP) functions and plans, hardware and software systems' structures and operation, and computer programming languages and techniques to assist in the resolution of automation problemsAssist in interfacing with and using minicomputer and mainframe computer systems in addressing project objectivesUse standard or conventional approaches, methods and techniques to assist in defining, planning, organizing, designing, developing, modifying, testing and integrating database or data processing systems, computer hardware systems and simulation models.Assist in formulating architectural design, functional specifications, interfaces and documentation of hardware or software systems.Use detailed specifications and adapt standardized techniques, methods, criteria and precedents to assist in developing or modifying portions of a system or programProvide recommendations for state-of-the-art storage and data retrieval implementation methods as well as formulate functional requirements for information systems.Assist in the modification of the Acquisition IA/ Cybersecurity Strategy for external systemsAssist the USG to organize, coordinate, identify, and satisfy the IA/Cybersecurity requirements consistent with DoD policies, standards, and system architectures.Apply knowledge of computer science principles, information management principles, Automated Data Processing (ADP) functions and plans, hardware and software systems' structures and operation, and computer programming languages and techniques to assist in the resolution of automation problems.Assist in the evaluation of different versions of security software for the USG’s automated systems.Assist with monitoring information system activities to ensure system integrity; establishing reaction and maintenance control for the facility; and assist in performing system access or revocation tasks.Report system security incidents, classified message incidents, vulnerabilities, and virus attacks IAW AFSSI 5021.Assist in ensuring information systems are cleared or sanitized IAW AFSSI 5020Provide assistance in developing, modifying, reviewing, and coordinating system PIT determination packages, IASs, IAPs, SSPs, Information Assurance Assessments, System Assessments, ISAs, Verification and Validation testing, Development and Design, requirements identification, Baseline Control selection, Applicability Assessments, Mitigation Strategies, Milestone Requirements Assessments, Configuration Management reviews, Continuous Monitoring, IA Liaison functions between the Developer, Simulators Division, User Community and Program Management.Provide program protection and system security input for SOOs, PWSs, RFPs, and CDRLs.Assist in the integration of US export and technology control laws, DoD/Air Force policy and instructions, and other applicable guidance into program protection planning.Recommend changes to DoD, Air Force and program security policy and instructions.Assist with developing and maintaining time-phased, event-driven SCGs & PSDs.Assist with monitoring and reviewing trade studies designed to balance program security risks with costs to the program.Assist with designing cost-effective approaches for integrating security requirements into weapon system contracts.Assist in the evaluation of security and administrative procedures associated with handling unclassified Critical Program Information/Critical Information (CPI/CI) and classified material.Assist in conducting analyses and producing reports of procedures regarding the handling, controlling, storage and disposition of classified or critical weapon system hardwareIdentify and recommend potential areas where existing data security policies and procedures may require change, or where a supplement is required to mitigate key security risks.Ensure communication to the ISSMs and Simulators Program Office Cyber leadership and the Program Managers during the lifecycle of the Authorization to Operate (ATO) period.Assist in ensuring that personnel accessing information systems have the proper cybersecurity certification to perform cybersecurity functions in accordance with the current version of DoD 8570.01-M, Information Assurance Workforce Improvement Program, and AFM 33-285 Cybersecurity Workforce Improvement Program. This applies to those tasks supporting any cybersecurity functionPossess knowledge and experience in providing oversight and execution of the Assessment & Authorization processes (a.k.a. Certification & Accreditation).to assist with ensuring the ISSMs clearly understand their duties as described in the PWS and mentor them to satisfactorily accomplish those duties.

QUALIFICATIONS:Education/Certifications/Experience/Skills:

Must

have Certification to

IAM level II

as defined in AFM 33-285 and DoD 8570.01MA Degree

in a related field and at least 20 years of experience, OR,

BA

degree in a related field with 25 years of experience, 15 years of which must be in the DoD, OR, 30 years of directly related experience with proper certifications, 20 of which must be in the DoDMust

possess and maintain an active DoD Secret Clearance.

P E Systems, Inc. is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for Employment without regard to race/ethnicity, color, religion, sex, nation origin, ancestry, age, sexual orientation, gender identity, genetic information, marital status and disability (including physical or mental disability as well as pregnancy) veteran status or any other status protected by the Federal, State or local law.

#CJ