Cybersecurity Support Customer Service & Call Center - Bedford, MA at Geebo

Cybersecurity Support

The Contractor shall provide Cybersecurity support to ensure that all system and application deliverables meet the requirements of all DoD and Air Force cybersecurity policies as identified in the following paragraphs.
The Contractor shall ensure that all system deliverables comply with DoD and Air Force cybersecurity policy, specifically DoDI 8500.
01, Cybersecurity, and that application deliverables are complaint with Public Law 111-383, which states the general need for software assurance.
Essential Job Functions:
To ensure that cybersecurity policy is implemented correctly on systems, the Contractor shall ensure compliance with DoD and Air Force certification and accreditation policies, specifically Department of Defense Instruction (DoDI) 8510.
01, Risk Management Framework (RMF) for DoD Information Technology.
The Contractor shall ensure that all application deliverables comply with DISA Application Security Development Security Technical Implementation Guide (STIG), which includes the need for source code scanning to mitigate vulnerabilities associated with SQL injections, cross-site scripting and buffer overflows.
The Contractor shall support activities and meet the requirements of DoDI 8520.
02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling, in order to achieve standardized, PKI- supported capabilities for biometrics, digital signatures, encryption, identification and authentication.
The Contractor shall be able to perform work that involves ensuring the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools.
The Contractor shall travel as required to support cybersecurity assessments or cybersecurity incidents.
The Contractor shall ensure personnel performing cybersecurity activities obtain and remain current with technical and/or management certifications to ensure compliance as directed by DoD 8140.
02, Identification, Tracking, and Reporting of Cyberspace Workforce Requirements, and outlined in DoD 8570.
01-M, Department of Defense Computer Network Defense (CND) Service Provider Certification and Accreditation Program, Appendix 3, Table 1,.
Responsibilities may include but are not limited to:
Assist with development of System Security Management Plans, Program Protection Plans, Security Risk Analyses, OPSEC Plans, Computer Certification and Accreditation, Security Vulnerability and Countermeasures Analyses, Security Concepts of Operations, and other system security engineering-related documents identified in MIL-STD 1785, DoDI 5000.
02, Operation of the Adaptive Acquisition Framework, and DoDI 8510.
01.
Support the system/application Authorization and Accreditation (A&A) effort to include assessing and guiding the quality and completeness of A&A activities, tasks and resulting artifacts mandated by governing DoD and Air Force policies (i.
e.
, Risk Management Framework (RMF).
Update, monitor, and manage information in systems for the program office.
Process and manage system user account requests and process tools.
Process and manage system port/protocol and access control list requirements.
Process and manage system Public Key Infrastructure (PKI) identification and authorization requirements.
Manage the distribution, implementation, remediation, and tracking of system security updates and configurations as required by the DoD.
Recommend policies and procedures to ensure information systems reliability and accessibility to prevent and defend against unauthorized access to systems, networks, and data.
Conduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risk, and protection needs.
Promote awareness of security issues among management and ensuring sound security principles are reflected in organizations' vision and goals.
Conduct systems security evaluations, audits and reviews.
Recommend systems security contingency plans and disaster recovery procedures.
Recommend and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures.
Participate in network and systems design to ensure implementation of appropriate systems security policies.
Recommend initial, or updates to, software and configurations to new or existing system security mechanisms.
Obtain waivers to mandated security mechanisms/policies which would be detrimental to system performance and impact the system's mission.
Facilitate the gathering, analysis and preservation of evidence used in the prosecution of computer.
Provide leadership assistance in the analysis of the design, development, integration, implementation and testing of cybersecurity requirements.
Develop risk-based strategies to address identified gaps.
Review, analysize, and assess implementations of cybersecurity (i.
e.
RMF security controls) throughout the open systems architecture and associated services, derived requirements specifications, design documents & design implementation.
Collaborate with stakeholders (Government and commercial) to ensure the system is approved by all Authorizing Officials via the RMF A&A process.
Provide technical advice in the area of systems security across all systems and supports.
Develop recommendations for the Government regarding how well designs satisfy current requirements and business goals.
Maintain databases that reflect receipt, storage, inventory, and disposition of classified information to include data entry, updates, and generation of reports.
Support Government program office in audits of Government classified holdings to ensure proper accountability.
Maintain databases of classified visits and clearance levels.
Perform inspection, inventory, logging, storage, documentation, transmittal and internal distribution of classified information received.
Evaluate Contractor classified data submittals for compliance with the appropriate System Security Classification Guide (SSCG).
Provide security inspection and protection to areas where classified information is being stored, and develop and establish security procedures and policies IAW DOD, USAF, AFMC, and local directives.
Develop training and provide security awareness and other security education programs.
Review and verify personnel qualifications for access to special access programs.
Develop, implement and maintain a communications security program.
Assess program disclosure issues and provide FMS case management support.
Assist and advise FMS program office management and leadership in interfacing with FMS customers and all USG organizations, including but not limited to SAF/IA, Air Force Security Assistance Center (AFSAC), Air Force Security Assistance Training (AFSAT) squadron, Defense Finance and Accounting Services (DFAS).
Support execution of all aspects of acquisition program security throughout a program's lifecycle.
Assist with development of sound security practices and policies regarding acquisition, physical, personnel and documentation security.
Update security classification guides.
Prepare acquisition security related sections of acquisition program documentation.
Review Contractor deliverables to ensure compliance with CDRLs.
Plan and implement security-related surveys, assessments, and studies.
Evaluate program security information and hardware throughout the program life cycle, to include studies, analyses, plans, procedures, production, test plans/results, transportation, technology, and storage of end items.
Provide security support to source selections Required Skills:
Due to the sensitivity of customer related requirements, U.
S.
Citizenship is required.
A High School Diploma plus 13 years of experience, an Associate plus 7 years, a Bachelor's degree plus 5 years or a Master's Degree plus 4 years of experience.
An adjudicated DoD Secret Security clearance on the First Day of employment.
CISSP Certification required.
Understanding of cybersecurity in DoD cloud infrastructure.
Understanding of Agile methods, including CI/CD, DevSecOps, and DevOps.
Possess the ability to effectively communicate in both written and verbal forms on highly technical topics.
Recommended Skills Access Control List Agile Methodology Application Security Assessments Auditing Biometrics Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3w0x15ykgwtlzc25gf', 'ExternalApply-j3w0x15ykgwtlzc25gf'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.