Amentum
Information Systems Security Officer
Amentum, Fort George Meade, Maryland, United States,
The Intel and Cyber Division is assembling a team of network engineers, systems engineers, Unified Communications Engineers, and Integration Engineers, change management specialists, information assurance professionals, and procurement personnel knowledgeable in SCRM processes to support a program that provides critical network capabilities. We are committed to recruiting and retaining this team for prototype development, test, and demonstration, as well as making this team available longer term for integration, deployment and sustainment as needed.
Candidates interested in joining the team must be critical thinkers, have a strong work ethic, and be able to work independently or as a member of a team in a dynamic environment that supports a critical and rewarding mission. We value candidates who are detail-oriented while also being able to think and react quickly to emerging and unique problem sets. To be successful, you must be able to rapidly adapt and learn how to operate the front and back end of new products and processes.
Responsibilities:
The duties and responsibilities of the Information Systems Security Officer include, but are not limited to, the following:
Generate and maintain the complete security Body of Evidence (BoE) while leading the A&A activities according to the Risk Management Framework (RMF) processes (ICD 503, CNSSI-1253, NIST 800-37, NIST 800-53, etc.) for all multiple information systems.Lead the development and maintenance of information security policies, standards, and control procedures to enable compliance with RMF.Complete Security Authorization packages, to include System Security Plans, Security Assessment Reports, POA&M summaries and a Continuous Monitoring Plan/assessment schedule, and present executive briefing to senior management.Ensure security risk assessments are conducted as appropriate on any system upgrades, software/hardware changes, etc.Ensure security authorization boundaries are properly defined and captured in the system security plans, and that all interconnection agreements are in place and current.Ensure system security controls contain accurate implementation statements and assessments results, and that appropriate artifacts are completed to support findings provide hands-on assistance as appropriate.Ensure POA&Ms have appropriate milestones, accurate description of the weaknesses and remediation, estimated cost to completion and realistic due dates providing hands-on assistance to components as necessary.Maintain day-to-day security posture and continuous monitoring of all Information Systems.Review system vulnerability scans, verify implementation of DISA STIG’s, and ensure other security relevant information system configuration tasks are completed.Perform test/evaluation of required technical security controls including performing certification tests and periodic inspections of information systems.Develop and conduct test procedures for verification Assessment and Authorization (A&A), Risk Management Framework (RMF) safeguards to meet customer requirements based NIST publications.Assess changes to an IS by performing periodic self-inspections, tests, and reviews of the IS program to ensure that systems are operating as authorized/accredited and that conditions have not changed; ensure corrective actions are taken for identified findings and vulnerabilities.
Requirements:
Must meet DoD 8570.01-M IAT-II or IAM-I baseline certification requirements such as Security + or equivalent.Experience with Microsoft Office applications such as Excel, Word, and Outlook.Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the RiskManagement Framework.Experience with security configurations across multiple operating systems in various environments, to include Windows, Linux, UNIX, utilizing Active Directory/Group Policy.In-depth knowledge of Microsoft Windows OS (client and server); familiarity with Red Hat Enterprise Linux (RHEL) desired.Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the Risk Management Framework.Experience with eMASS, XACTA, ACAS/NESSUS, Trellix, and Splunk.Experience with risk managed downloads, IS sanitization and destruction, contaminations, incident response, virus scanning, privileged user access, and hardware/software configuration management.Experience with developing IT policy, guidance, or procedure documentation supporting cybersecurity accreditations.Experience with analyzing, assessing, or implementing NIST SP 800-53 security controls, CCIs, and associated assessment procedures.Experience with developing and presenting complex technical information for technical and non-technical audiences.Expert familiarity with RMF.Experience with Microsoft Office applications such as Excel, Word, Outlook, and SharePoint.Exceptional attention to detail; excellent verbal and written communication skills; strong organizational skills; critical thinking and problem-solving skills.Ability to work both independently and as part of a team in a dynamic environment.Ability to travel up to 25%.
Clearance Required:
Must have active Top Secret clearance with SCI or TS with the ability to acquire SCI
Minimum Education:
High School Diploma
Minimum Years of Experience:
8+ years of related experience
Preferred:
Bachelor's degree in cybersecurity or related fieldPrevious supervision and/or participation with cybersecurity Assessment and Authorizations.Ability to provide hands-on cyber security tool assistance as necessary.Familiarity with cybersecurity tool suite; ForeScout, Avanti, and HBSS.
#javelin
Pay Transparency Verbiage
Amentum’s health and welfare benefits are designed to invest in you and in the things you care about. Your health. Your well-being. Your security. Your future. Eligible employees and their dependents may elect medical, dental, vision, and basic life insurance. Employees are able to enroll in our company’s 401k plan, and, if eligible, a deferred compensation plan and Executive Deferral Plan. Employees will also receive 17 days of vacation per year, seven paid holidays, plus floating holidays and caregiver leave. Hired applicants will be able to purchase company stock and have the opportunity to receive a performance discretionary bonus.
The base salary range for this position is $140K to $155K. This range reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.Receive tips & info on cleared job search, security clearances and career development.
#J-18808-Ljbffr
Candidates interested in joining the team must be critical thinkers, have a strong work ethic, and be able to work independently or as a member of a team in a dynamic environment that supports a critical and rewarding mission. We value candidates who are detail-oriented while also being able to think and react quickly to emerging and unique problem sets. To be successful, you must be able to rapidly adapt and learn how to operate the front and back end of new products and processes.
Responsibilities:
The duties and responsibilities of the Information Systems Security Officer include, but are not limited to, the following:
Generate and maintain the complete security Body of Evidence (BoE) while leading the A&A activities according to the Risk Management Framework (RMF) processes (ICD 503, CNSSI-1253, NIST 800-37, NIST 800-53, etc.) for all multiple information systems.Lead the development and maintenance of information security policies, standards, and control procedures to enable compliance with RMF.Complete Security Authorization packages, to include System Security Plans, Security Assessment Reports, POA&M summaries and a Continuous Monitoring Plan/assessment schedule, and present executive briefing to senior management.Ensure security risk assessments are conducted as appropriate on any system upgrades, software/hardware changes, etc.Ensure security authorization boundaries are properly defined and captured in the system security plans, and that all interconnection agreements are in place and current.Ensure system security controls contain accurate implementation statements and assessments results, and that appropriate artifacts are completed to support findings provide hands-on assistance as appropriate.Ensure POA&Ms have appropriate milestones, accurate description of the weaknesses and remediation, estimated cost to completion and realistic due dates providing hands-on assistance to components as necessary.Maintain day-to-day security posture and continuous monitoring of all Information Systems.Review system vulnerability scans, verify implementation of DISA STIG’s, and ensure other security relevant information system configuration tasks are completed.Perform test/evaluation of required technical security controls including performing certification tests and periodic inspections of information systems.Develop and conduct test procedures for verification Assessment and Authorization (A&A), Risk Management Framework (RMF) safeguards to meet customer requirements based NIST publications.Assess changes to an IS by performing periodic self-inspections, tests, and reviews of the IS program to ensure that systems are operating as authorized/accredited and that conditions have not changed; ensure corrective actions are taken for identified findings and vulnerabilities.
Requirements:
Must meet DoD 8570.01-M IAT-II or IAM-I baseline certification requirements such as Security + or equivalent.Experience with Microsoft Office applications such as Excel, Word, and Outlook.Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the RiskManagement Framework.Experience with security configurations across multiple operating systems in various environments, to include Windows, Linux, UNIX, utilizing Active Directory/Group Policy.In-depth knowledge of Microsoft Windows OS (client and server); familiarity with Red Hat Enterprise Linux (RHEL) desired.Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the Risk Management Framework.Experience with eMASS, XACTA, ACAS/NESSUS, Trellix, and Splunk.Experience with risk managed downloads, IS sanitization and destruction, contaminations, incident response, virus scanning, privileged user access, and hardware/software configuration management.Experience with developing IT policy, guidance, or procedure documentation supporting cybersecurity accreditations.Experience with analyzing, assessing, or implementing NIST SP 800-53 security controls, CCIs, and associated assessment procedures.Experience with developing and presenting complex technical information for technical and non-technical audiences.Expert familiarity with RMF.Experience with Microsoft Office applications such as Excel, Word, Outlook, and SharePoint.Exceptional attention to detail; excellent verbal and written communication skills; strong organizational skills; critical thinking and problem-solving skills.Ability to work both independently and as part of a team in a dynamic environment.Ability to travel up to 25%.
Clearance Required:
Must have active Top Secret clearance with SCI or TS with the ability to acquire SCI
Minimum Education:
High School Diploma
Minimum Years of Experience:
8+ years of related experience
Preferred:
Bachelor's degree in cybersecurity or related fieldPrevious supervision and/or participation with cybersecurity Assessment and Authorizations.Ability to provide hands-on cyber security tool assistance as necessary.Familiarity with cybersecurity tool suite; ForeScout, Avanti, and HBSS.
#javelin
Pay Transparency Verbiage
Amentum’s health and welfare benefits are designed to invest in you and in the things you care about. Your health. Your well-being. Your security. Your future. Eligible employees and their dependents may elect medical, dental, vision, and basic life insurance. Employees are able to enroll in our company’s 401k plan, and, if eligible, a deferred compensation plan and Executive Deferral Plan. Employees will also receive 17 days of vacation per year, seven paid holidays, plus floating holidays and caregiver leave. Hired applicants will be able to purchase company stock and have the opportunity to receive a performance discretionary bonus.
The base salary range for this position is $140K to $155K. This range reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.Receive tips & info on cleared job search, security clearances and career development.
#J-18808-Ljbffr