Apply Now

Senior Information Systems and Cyber Security Specialist

Dayton, OH, USA | VT Group

  • Industry:
    Airlines/Aviation/Aerospace
  • Position Type:
    Full-Time
  • Functions:
    Engineering
  • Experience:
    10-12 years
Job Description:
50 people have viewed this job

Job Description


Overview


VTG is seeking a Senior Information Systems and Cyber Security Specialist to support our contract at Wright-Patterson AFB, OH. The Senior Information Systems and Cyber Security Specialist shall assist in ensuring implementation of DoD, USAF and MAJCOM policies and update local processes and procedures necessary to support day-to-day operations.


Responsibilities



  •   Assist the USG to organize, coordinate, identify, and satisfy the IA/ Cybersecurity requirements consistent with DoD policies, standards, and system architectures.

  •   Assist in formulating architectural design, functional specifications, interfaces and documentation of hardware or software systems.

  •   Utilize the RMF to support Authorization and Accreditation (A&A) of assigned systems.

  •   Assist in the monitoring of systems throughout the lifecycle management process from concept to decommission.

  •   Provide assistance in developing, modifying, reviewing, and coordinating IT Categorization Determination packages, Information Assurance Strategies (IASs), Information Assurance Plans (IAPs), PPPs, SSPs, Information Assurance Assessments, System Assessments, Interconnection Security Agreements (ISAs), Verification and Validation testing, Development and Design, requirements identification, Baseline Control selection, Applicability Assessments, Mitigation Strategies, Milestone Requirements Assessments, Configuration Management reviews, Continuous Monitoring, IA Liaison functions between the Developer, User Community and Program Management, leading the IA Integrated Process Team (IAIPT).

  •   Assist with the evaluation of technical implementations of security designs to ensure that security software, hardware, and firmware features affecting confidentiality, integrity, availability, accountability, and non-repudiation have been implemented as documented in the JSIG (current version)/NIST 800-53 or while meeting the IA/Cybersecurity requirements of DoD Instruction 8500.01, Cybersecurity, DoD Instruction 8510.01, Risk Management Framework (RMF) for DoD Information Technology (IT), DoD Instruction 5200.39, and Air Force Instruction (AFI) 33-210, Air Force Certification and Accreditation (C&A) Program (AFCAP), as well as DCID 6/3, and JSIG requirements.


Systems and Applications



  •   Have a working knowledge of telecommunications concepts and principles, operating modes, systems, media, equipment, equipment configuration, and related software systems, processes and procedures to assess and advise on vulnerability to attack from a variety of sources (e.g., espionage, disruption of services, destructive programs/applications) and procedures and methods for protection of systems and applications.

  •   Apply understanding of computer science principles, information management principles, automated data processing (ADP) functions and plans, hardware and software systems' structures and operation, and computer programming languages and techniques to assist in the resolution of automation problems.

  •   Use standard or conventional approaches, methods and techniques to assist in defining, planning, organizing, designing, developing, modifying, testing and integrating database or data processing systems, computer hardware systems and simulation models.


Information Assurance/Cybersecurity



  •   Assist in the modification of the Acquisition IA/ Cybersecurity Strategy for external systems.

  •   Assist the USG to organize, coordinate, identify, and satisfy the IA/Cybersecurity requirements consistent with DoD policies, standards, and system architectures.

  •   Have knowledge of computer science principles, information management principles, Automated Data Processing (ADP) functions and plans, hardware and software systems' structures and operation, and computer programming languages and techniques to assist in the resolution of automation problems.

  •   Assist with monitoring information system activities to ensure system integrity; establishing reaction and maintenance control for the facility; and assist in performing system access or revocation tasks.

  •   Report system security incidents, classified message incidents, vulnerabilities, and virus attacks IAW AFSSI 5021.

  •   Provide assistance in developing, modifying, reviewing, and coordinating system PIT determination packages, IASs, IAPs, SSPs, Information Assurance Assessments, System Assessments, ISAs, Verification and Validation testing, Development and Design, requirements identification, Baseline Control selection, Applicability Assessments, Mitigation Strategies, Milestone Requirements Assessments, Configuration Management reviews, Continuous Monitoring, IA Liaison functions between the Developer, Simulators Division, User Community and Program Management.


Critical Information


  Assist in the evaluation of security and administrative procedures associated with handling unclassified Critical Program Information/Critical Information (CPI/CI) and classified material.


Qualifications


Required Skills:



  •   Ability to perform on high-visibility or mission critical aspects of a given program and perform all functional duties independently.

  •   Oversee the efforts of less senior staff and/or be responsible for the efforts of all contracted staff assigned to a specific job.

  •   Certification to IAM level II as defined in AFM 33-285 and DoD 8570.01; and a Bachelor’s degree in a Science, Technology, Engineering, Math, Cybersecurity, or Computer Science field of study and more than 10 years of experience specifically in cybersecurity or information assurance; oran Associate degree in a Science, Technology, Engineering, Math, Cybersecurity, or Computer Science field of study and more than 16 years of experience specifically in cybersecurity or information assurance.

  • Travel: Travel 15%

  • Clearance: Active Secret Security Clearance


Apply


Share Job



  • National Security customers’ most challenging and dynamic mission requirements. VTG delivers force modernization and digital transformation solutions that expand America’s competitive advantage in the modern battlespace. Whether at sea, in the air, on land, or in cyberspace, our agile solutions ensure our Defense and National Security customers meet their most challenging and dynamic mission requirements. VTG delivers Tomorrow’s Transformation Today.

  • VTG delivers transformative solutions at sea, in the air, on land, and in cyberspace. If you are looking to work on exciting projects at an organization that appreciates your contributions and rewards performance, join VTG today – tomorrow can’t wait.


 


Other companies hiring with Ivy Exec

 Company Logos