Columbus Sverige
Cybersecurity Specialist
Columbus Sverige, Huntsville, Alabama, United States, 35824
Overview
Must be US Citizen with the ability to obtain a Secret Clearance.Onsite at NASA's Marshall Space Flight Center in Huntsville, AL. Position is currently hybrid; however, it may transition to onsite by the end of the year. Ongoing fully benefitted W2 position.The US pay for this full-time position is $37.50 per hour. Salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.The Cybersecurity Specialist will be responsible for implementing and executing risk management processes by utilizing National Institute of Standards and Technology (NIST) 800 series special publications, Federal Information Processing Standards (FIPS), and Federal Information Security Modernization Act (FISMA) compliance frameworks. The Cybersecurity Specialist will work in a collaborative unified team environment to monitor, evaluate, and manage the risk posture of systems’ authorization boundary to safeguard information systems by leveraging a robust understanding of NIST Risk Management Framework (RMF). This position will involve working closely with the organization’s IT teams to identify vulnerabilities, conduct security control assessments, perform risk analysis and assessments, develop security strategies for mitigating and resolving findings, provide cybersecurity compliance guidance to IT teams, and ensure systems remain compliant with federal standards and regulations.
Responsibilities
Mid-level Cybersecurity support. Applies advanced knowledge of concepts, processes, practices, and procedures on technical assignments. Supports enterprise Cybersecurity standards. Supports the development and implementation of Cybersecurity standards and procedures. Coordinates the development and makes recommendations of security programs for an organization. Recommends Cybersecurity solutions to support customers' requirements. Identifies and reports security violations. Recommends and satisfies Cybersecurity requirements based upon the analysis of CSPP, policy, regulatory, and resource demands. Supports customers at the highest levels in the development and implementation of processes and policies. Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures. Supports analysis, design, and development of security features for system architectures. Analyzes and recommends security requirements for computer systems which may include mainframes, workstations, and personal computers. Supports designing, development, engineering, and implementation of solutions that meet security requirements. Supports integration and implementation of the computer system security solution. Analyzes general Cybersecurity-related technical problems and provides basic engineering and technical support in solving these problems. Supports vulnerability/risk analyses and makes recommendations of computer systems and applications during all phases of the system development life cycle. Performs all procedures necessary to ensure the safety of information systems data assets and to protect systems from intentional or inadvertent access or destruction. Ensures that all information systems are functional and secure.Key Responsibilities:• Supports the Cybersecurity Program by managing Authorization Packages (AP) to include Privacy Analysis, System Categorizations, Risk Assessment Reports (RAR), System Security Plan (SSP), and general Assessment and Authorization (A&A) oversight to obtain or maintain a system’s Authorization to Operate (ATO).• Focal point for enterprise SSPs managing the security posture by supporting Information System Owners (ISO) and Information System Security Officials (ISSO) with RMF responsibilities.• Develop and maintain accurate and effective Plans of Action & Milestones (POA&Ms) as part of continuous monitoring for implementing cybersecurity improvements.• Collaborate with Information System Administrators (ISA) and various Engineering teams to integrate security measures into new and existing information systems and major applications.• Stay up to date on general information technology innovations and emerging threats and security technologies to continuously improve security posture.
Qualifications
Required/Desired Qualifications:• Must be US Citizen with the ability to obtain a Secret Clearance.• Bachelor's degree in Cybersecurity, Management of Information Technology, or a related field.• Minimum 4 years experience in information security or related roles. 5-10 years experience preferred.• Familiarity with networking ports and protocols, architecture of networked and standalone systems, functionality of various operating systems, cloud computing environments, and common security tools.• Ability to digest and comprehend information system topology diagrams and Concept of Operations documentation.• Knowledge of federal standards such as NIST, FISMA, and FIPS.• Exposure to FedRAMP program and standards.• Exposure to Security Control Audits.• Proficient with MS Office.• Relevant certifications (e.g., CompTIA Network+, Security+, CySA+) are a plus.
#J-18808-Ljbffr
Must be US Citizen with the ability to obtain a Secret Clearance.Onsite at NASA's Marshall Space Flight Center in Huntsville, AL. Position is currently hybrid; however, it may transition to onsite by the end of the year. Ongoing fully benefitted W2 position.The US pay for this full-time position is $37.50 per hour. Salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.The Cybersecurity Specialist will be responsible for implementing and executing risk management processes by utilizing National Institute of Standards and Technology (NIST) 800 series special publications, Federal Information Processing Standards (FIPS), and Federal Information Security Modernization Act (FISMA) compliance frameworks. The Cybersecurity Specialist will work in a collaborative unified team environment to monitor, evaluate, and manage the risk posture of systems’ authorization boundary to safeguard information systems by leveraging a robust understanding of NIST Risk Management Framework (RMF). This position will involve working closely with the organization’s IT teams to identify vulnerabilities, conduct security control assessments, perform risk analysis and assessments, develop security strategies for mitigating and resolving findings, provide cybersecurity compliance guidance to IT teams, and ensure systems remain compliant with federal standards and regulations.
Responsibilities
Mid-level Cybersecurity support. Applies advanced knowledge of concepts, processes, practices, and procedures on technical assignments. Supports enterprise Cybersecurity standards. Supports the development and implementation of Cybersecurity standards and procedures. Coordinates the development and makes recommendations of security programs for an organization. Recommends Cybersecurity solutions to support customers' requirements. Identifies and reports security violations. Recommends and satisfies Cybersecurity requirements based upon the analysis of CSPP, policy, regulatory, and resource demands. Supports customers at the highest levels in the development and implementation of processes and policies. Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures. Supports analysis, design, and development of security features for system architectures. Analyzes and recommends security requirements for computer systems which may include mainframes, workstations, and personal computers. Supports designing, development, engineering, and implementation of solutions that meet security requirements. Supports integration and implementation of the computer system security solution. Analyzes general Cybersecurity-related technical problems and provides basic engineering and technical support in solving these problems. Supports vulnerability/risk analyses and makes recommendations of computer systems and applications during all phases of the system development life cycle. Performs all procedures necessary to ensure the safety of information systems data assets and to protect systems from intentional or inadvertent access or destruction. Ensures that all information systems are functional and secure.Key Responsibilities:• Supports the Cybersecurity Program by managing Authorization Packages (AP) to include Privacy Analysis, System Categorizations, Risk Assessment Reports (RAR), System Security Plan (SSP), and general Assessment and Authorization (A&A) oversight to obtain or maintain a system’s Authorization to Operate (ATO).• Focal point for enterprise SSPs managing the security posture by supporting Information System Owners (ISO) and Information System Security Officials (ISSO) with RMF responsibilities.• Develop and maintain accurate and effective Plans of Action & Milestones (POA&Ms) as part of continuous monitoring for implementing cybersecurity improvements.• Collaborate with Information System Administrators (ISA) and various Engineering teams to integrate security measures into new and existing information systems and major applications.• Stay up to date on general information technology innovations and emerging threats and security technologies to continuously improve security posture.
Qualifications
Required/Desired Qualifications:• Must be US Citizen with the ability to obtain a Secret Clearance.• Bachelor's degree in Cybersecurity, Management of Information Technology, or a related field.• Minimum 4 years experience in information security or related roles. 5-10 years experience preferred.• Familiarity with networking ports and protocols, architecture of networked and standalone systems, functionality of various operating systems, cloud computing environments, and common security tools.• Ability to digest and comprehend information system topology diagrams and Concept of Operations documentation.• Knowledge of federal standards such as NIST, FISMA, and FIPS.• Exposure to FedRAMP program and standards.• Exposure to Security Control Audits.• Proficient with MS Office.• Relevant certifications (e.g., CompTIA Network+, Security+, CySA+) are a plus.
#J-18808-Ljbffr