Overview
System Cybersecurity II WORK LOCATION: Hanscom, AFB, MA JOB STATUS: Full-Time; salaried SALARY RANGE: $140-150,000 annually* *depending on experience, certifications, and qualifications SECURITY CLEARANCE: Secret Astrion has an exciting opportunity for a System Cyber Security II to directly support the Unified Capabilities (UC) (AFLCMC/HNIT) and Infrastructure Division (AFLCMC/HNI) located at Hanscom AFB, MA. REQUIRED QUALIFICATIONS:
- Education: Bachelor's or Master's Degree in a related field
- Years of Experience: At least three years of experience in the respective technical / professional discipline being performed, three of which must be in the DoD. Or seven years of directly related experience with proper certifications may substitute for Bachelor's degree.
- Current Required Security Clearance: DoD Secret clearance
DESIRED QUALIFICATIONS / SKILLS:
- Certified in accordance with DoDD 8140 and DoD 8570.01-M, Information Assurance Workforce Improvement Program, standards such as IAM Level II certification (e.g.: CAP, CASP, CISM, or CISM)
- Experience performing work that involves ensuring the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools
RESPONSIBILITIES:
- Perform ISSO duties as outlined in Department of Defense Instruction (DoDI) 8510.01 and DoDI 8500.01 for assigned systems/applications.
- Support implementation of the Risk Management Framework (RMF).
- Assist AO in making informed, credible, risk-based decisions.
- Develop and maintain a formal Information Systems (ISs) security program and policies for their assigned area of responsibility.
- Supporting the system/application authorization and accreditation (A&A) effort, to include assessing and guiding the quality and completeness of A&A activities, tasks, and resulting artifacts mandated by governing DoD and Air Force policies (i.e., RMF).
- Maintain a repository for all organizational or system-level cybersecurity-related documentation.
- Monitor compliance with cybersecurity policy, as appropriate, and review the results of such monitoring.
- Report and resolve security issues/violations.
- Develop, review, and approve plans, schedules, and other technical documentation.
- Facilitate and support Division meetings/reviews, team building, and strategic planning.
|