Odyssey Systems
Cybersecurity Engineer
Odyssey Systems, Bedford, Massachusetts, us, 01730
Cybersecurity Engineer
Job Locations
US-MA-Bedford
ID
2024-5572
Category
Cybersecurity
Type
Full Time
Hours/Week
40
Location : Name
Hanscom AFB
Position Summary
Odyssey Systems has an exciting opportunity for a
Cybersecurity Engineer
providing support to the C3C/Kessel Run (KR) Division. Specifically this will be supporting the AOC program.This is a full-time position located at Hanscom AFB, Bedford, MA.Responsibilities
Duties include, but not limited to:Assist with development of System Security Management Plans, Program Protection Plans, Security Risk Analyses, OPSEC Plans, Computer Certification and Accreditation, Security Vulnerability and Countermeasures Analyses, Security Concepts of Operations, and other system security engineering-related documents identified in MIL-STD 1785, DoDI 5000.02, Operation of the Adaptive Acquisition Framework, and DoDI 8510.01
Support the system/application Authorization and Accreditation (A&A) effort to include assessing and guiding the quality and completeness of A&A activities, tasks and resulting artifacts mandated by governing DoD and Air Force policies (i.e., Risk Management Framework (RMF) to support the AOC WS request for variance process. Review, validate, and work with the AOC WS ISSM to support the approval for both Site and Supported Requests for Variance (RFV) for over 20+ sites.
Support the approval or denial based on SPO Cyber RFV checklist Appendix D, as documented in Request for Variance Business Process for the Air Operations Center, ABP 005.Review RFV artifacts including the site security test reports, PPSM, site POA&M, and all applicable cuber documentation then draft recommendation to the AOC WS ISSM
Provide Validation and Verification Assessment (VVA) Support implementing the continuous monitoring outlined in the AOC WS Continuous Monitoring Plan and AFI 17-101, Step 6 of RMF. Conduct VVA IAW Program Management Office (PMO) Validation and Verification Assessment (VVA) Business Process Guide, ABP 024.
Boots on Ground Assessment - Provide security assessments of subset of AOC WS baseline systemsFirewall evaluation IAW Annex E (approved PPSM for AOC WS)Network evaluation IAW AOC WS CM releasesWindows server/clients and Red Hat server evaluations IAW AOC WS CM releasesAssess GPOs applied, Patches, ePO Policy settings, etc.Develop site specific worksheet/POA&M and provide to site to close open findingWork with site to ensure all open findings are closed IAW cyber plan/previously released CSUs and AREsWork with PC to determine root cause of open findings/missing from current documents, missing scripts, etcJIRA Support - Work with site to open tickets to help resolve cyber issuesProvide security assess and validate RFVs configurations IAW RFV test data and documentation
Update, monitor, and manage information in systems for the program officeProcess and manage system user account requests and process toolsProcess and manage system port/protocol and access control list requirementsProcess and manage system Public Key Infrastructure (PKI) identification and authorization requirementsManage the distribution, implementation, remediation, and tracking of system security updates and configurations as required by the DoDRecommend policies and procedures to ensure information systems reliability and accessibility to prevent and defend against unauthorized access to systems, networks, and dataConduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risk, and protection needsPromote awareness of security issues among management and ensuring sound security principles are reflected in organizations' vision and goalsConduct systems security evaluations, audits and reviewsRecommend systems security contingency plans and disaster recovery proceduresRecommend and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and proceduresParticipate in network and systems design to ensure implementation of appropriate systems security policiesRecommend initial, or updates to, software and configurations to new or existing system security mechanismsObtain waivers to mandated security mechanisms/policies which would be detrimental to system performance and impact the system's missionFacilitate the gathering, analysis and preservation of evidence used in the prosecution of computerProvide leadership assistance in the analysis of the design, development, integration, implementation and testing of cybersecurity requirementsDevelop risk-based strategies to address identified gapsReview, analyze, and assess implementations of cybersecurity (i.e. RMF security controls) throughout the open systems architecture and associated services, derived requirements specifications, design documents & design implementationCollaborate with stakeholders (Government and commercial) to ensure the system is approved by all Authorizing Officials via the RMF A&A processProvide technical advice in the area of systems security across all systems and supportsDevelop recommendations for the Government regarding how well designs satisfy current requirements and business goalsMaintain databases that reflect receipt, storage, inventory, and disposition of classified information to include data entry, updates, and generation of reportsSupport Government program office in audits of Government classified holdings to ensure proper accountabilityMaintain databases of classified visits and clearance levelsPerform inspection, inventory, logging, storage, documentation, transmittal and internal distribution of classified information receivedEvaluate Contractor classified data submittals for compliance with the appropriate System Security Classification Guide (SSCG)Provide security inspection and protection to areas where classified information is being stored, and develop and establish security procedures and policies IAW DOD, USAF, AFMC, and local directivesDevelop training and provide security awareness and other security education programsReview and verify personnel qualifications for access to special access programsDevelop, implement and maintain a communications security programAssess program disclosure issues and provide FMS case management supportAssist and advise FMS program office management and leadership in interfacing with FMS customers and all USG organizations, including but not limited to SAF/IA, Air Force Security Assistance Center (AFSAC), Air Force Security Assistance Training (AFSAT) squadron, Defense Finance and Accounting Services (DFAS)Support execution of all aspects of acquisition program security throughout a program's lifecycleAssist with development of sound security practices and policies regarding acquisition, physical, personnel and documentation securityUpdate security classification guidesPrepare acquisition security related sections of acquisition program documentationReview Contractor deliverables to ensure compliance with CDRLsPlan and implement security-related surveys, assessments, and studiesEvaluate program security information and hardware throughout the program life cycle, to include studies, analyses, plans, procedures, production, test plans/results, transportation, technology, and storage of end itemsProvide security support to source selectionsQualifications
Citizenship: Must be a US citizenMinimum Required QualificationsClearance
:
Must have and be able to maintain a Secret level clearanceYears of Experience:
7 years of directly related experience, 5 of which must be in the DoDUnderstanding of cybersecurity in DoD cloud infrastructureUnderstanding of Agile methods, including CI/CD, DevSecOps, and DevOpsPossess the ability to effectively communicate in both written and verbal forms on highly technical topicsAdditional InformationLocation:
Hanscom AFB, Bedford, MATravel:
Travel may be required per the customer's discretion#LI-MK1Company Overview
Odyssey Systems Consulting Group,
is an innovative small business committed to providing world-class technical, management, and training support services to government and public sector clients. We focus on people, processes, and performance to deliver superior results. Since our inception in 1997, our commitment to mission success and customer satisfaction has been recognized with exponential growth and exceptional past performance ratings. We accept challenging assignments and drive projects from the planning stages, through implementation, and into operations and support.Please note:
Final compensation for this position will be determined by various factors such as the Federal Government contract labor categories and contract wage rates, relevant work experience, specific skills and competencies, geographic location, education, and certifications.Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
Job Locations
US-MA-Bedford
ID
2024-5572
Category
Cybersecurity
Type
Full Time
Hours/Week
40
Location : Name
Hanscom AFB
Position Summary
Odyssey Systems has an exciting opportunity for a
Cybersecurity Engineer
providing support to the C3C/Kessel Run (KR) Division. Specifically this will be supporting the AOC program.This is a full-time position located at Hanscom AFB, Bedford, MA.Responsibilities
Duties include, but not limited to:Assist with development of System Security Management Plans, Program Protection Plans, Security Risk Analyses, OPSEC Plans, Computer Certification and Accreditation, Security Vulnerability and Countermeasures Analyses, Security Concepts of Operations, and other system security engineering-related documents identified in MIL-STD 1785, DoDI 5000.02, Operation of the Adaptive Acquisition Framework, and DoDI 8510.01
Support the system/application Authorization and Accreditation (A&A) effort to include assessing and guiding the quality and completeness of A&A activities, tasks and resulting artifacts mandated by governing DoD and Air Force policies (i.e., Risk Management Framework (RMF) to support the AOC WS request for variance process. Review, validate, and work with the AOC WS ISSM to support the approval for both Site and Supported Requests for Variance (RFV) for over 20+ sites.
Support the approval or denial based on SPO Cyber RFV checklist Appendix D, as documented in Request for Variance Business Process for the Air Operations Center, ABP 005.Review RFV artifacts including the site security test reports, PPSM, site POA&M, and all applicable cuber documentation then draft recommendation to the AOC WS ISSM
Provide Validation and Verification Assessment (VVA) Support implementing the continuous monitoring outlined in the AOC WS Continuous Monitoring Plan and AFI 17-101, Step 6 of RMF. Conduct VVA IAW Program Management Office (PMO) Validation and Verification Assessment (VVA) Business Process Guide, ABP 024.
Boots on Ground Assessment - Provide security assessments of subset of AOC WS baseline systemsFirewall evaluation IAW Annex E (approved PPSM for AOC WS)Network evaluation IAW AOC WS CM releasesWindows server/clients and Red Hat server evaluations IAW AOC WS CM releasesAssess GPOs applied, Patches, ePO Policy settings, etc.Develop site specific worksheet/POA&M and provide to site to close open findingWork with site to ensure all open findings are closed IAW cyber plan/previously released CSUs and AREsWork with PC to determine root cause of open findings/missing from current documents, missing scripts, etcJIRA Support - Work with site to open tickets to help resolve cyber issuesProvide security assess and validate RFVs configurations IAW RFV test data and documentation
Update, monitor, and manage information in systems for the program officeProcess and manage system user account requests and process toolsProcess and manage system port/protocol and access control list requirementsProcess and manage system Public Key Infrastructure (PKI) identification and authorization requirementsManage the distribution, implementation, remediation, and tracking of system security updates and configurations as required by the DoDRecommend policies and procedures to ensure information systems reliability and accessibility to prevent and defend against unauthorized access to systems, networks, and dataConduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risk, and protection needsPromote awareness of security issues among management and ensuring sound security principles are reflected in organizations' vision and goalsConduct systems security evaluations, audits and reviewsRecommend systems security contingency plans and disaster recovery proceduresRecommend and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and proceduresParticipate in network and systems design to ensure implementation of appropriate systems security policiesRecommend initial, or updates to, software and configurations to new or existing system security mechanismsObtain waivers to mandated security mechanisms/policies which would be detrimental to system performance and impact the system's missionFacilitate the gathering, analysis and preservation of evidence used in the prosecution of computerProvide leadership assistance in the analysis of the design, development, integration, implementation and testing of cybersecurity requirementsDevelop risk-based strategies to address identified gapsReview, analyze, and assess implementations of cybersecurity (i.e. RMF security controls) throughout the open systems architecture and associated services, derived requirements specifications, design documents & design implementationCollaborate with stakeholders (Government and commercial) to ensure the system is approved by all Authorizing Officials via the RMF A&A processProvide technical advice in the area of systems security across all systems and supportsDevelop recommendations for the Government regarding how well designs satisfy current requirements and business goalsMaintain databases that reflect receipt, storage, inventory, and disposition of classified information to include data entry, updates, and generation of reportsSupport Government program office in audits of Government classified holdings to ensure proper accountabilityMaintain databases of classified visits and clearance levelsPerform inspection, inventory, logging, storage, documentation, transmittal and internal distribution of classified information receivedEvaluate Contractor classified data submittals for compliance with the appropriate System Security Classification Guide (SSCG)Provide security inspection and protection to areas where classified information is being stored, and develop and establish security procedures and policies IAW DOD, USAF, AFMC, and local directivesDevelop training and provide security awareness and other security education programsReview and verify personnel qualifications for access to special access programsDevelop, implement and maintain a communications security programAssess program disclosure issues and provide FMS case management supportAssist and advise FMS program office management and leadership in interfacing with FMS customers and all USG organizations, including but not limited to SAF/IA, Air Force Security Assistance Center (AFSAC), Air Force Security Assistance Training (AFSAT) squadron, Defense Finance and Accounting Services (DFAS)Support execution of all aspects of acquisition program security throughout a program's lifecycleAssist with development of sound security practices and policies regarding acquisition, physical, personnel and documentation securityUpdate security classification guidesPrepare acquisition security related sections of acquisition program documentationReview Contractor deliverables to ensure compliance with CDRLsPlan and implement security-related surveys, assessments, and studiesEvaluate program security information and hardware throughout the program life cycle, to include studies, analyses, plans, procedures, production, test plans/results, transportation, technology, and storage of end itemsProvide security support to source selectionsQualifications
Citizenship: Must be a US citizenMinimum Required QualificationsClearance
:
Must have and be able to maintain a Secret level clearanceYears of Experience:
7 years of directly related experience, 5 of which must be in the DoDUnderstanding of cybersecurity in DoD cloud infrastructureUnderstanding of Agile methods, including CI/CD, DevSecOps, and DevOpsPossess the ability to effectively communicate in both written and verbal forms on highly technical topicsAdditional InformationLocation:
Hanscom AFB, Bedford, MATravel:
Travel may be required per the customer's discretion#LI-MK1Company Overview
Odyssey Systems Consulting Group,
is an innovative small business committed to providing world-class technical, management, and training support services to government and public sector clients. We focus on people, processes, and performance to deliver superior results. Since our inception in 1997, our commitment to mission success and customer satisfaction has been recognized with exponential growth and exceptional past performance ratings. We accept challenging assignments and drive projects from the planning stages, through implementation, and into operations and support.Please note:
Final compensation for this position will be determined by various factors such as the Federal Government contract labor categories and contract wage rates, relevant work experience, specific skills and competencies, geographic location, education, and certifications.Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities