The One 23 Group is hiring: Cybersecurity Engineer - Mid-Level in Fairfax
The One 23 Group, Fairfax, VA, US, 22032
Job Description
At The One 23 Group, our mission is to set the benchmark for excellence in government services. We empower our clients in the Department of Defense, Intelligence Community, and Federal Civilian sectors to excel with our advanced capabilities. Our dedication lies in fostering a people-first culture, underpinned by steadfast ethical principles. Embracing innovative technologies and process improvements, we are steadfast in our journey toward a future that is both bright and transformative.
Our expertise spans consulting and analytics, digital workplace solutions, and cyber compliance. With our global footprint, we place a strong emphasis on nurturing our people and culture, which forms the core of our successful strategies in leadership and financial management. We pride ourselves on our extensive experience and effective approach, ensuring that we lead with both innovation and integrity.
The One 23 Group, a Virginia-based Government Contractor, seeks a Cybersecurity Engineer local to Washington, DC Metropolitan area.
Requirements:- Develop, write, and maintain a formal Information Systems Security Program (ISSP) that includes all applicable security Information Systems (IS) documentation in accordance with Intelligence Community/OCIO policies for up to 16 SPIDS under continuous monitoring protocols and standards, including, but not limited to: Concept of Operations (CONOPS), System Security Plans (SSPs), System Security Authorization Agreements (SSAAs), Security-related Interconnection Security Agreements (ISAs), Memorandums of Understanding/ Agreement (MOUs/MOAs), Network and system diagrams and Security Requirement Traceability Matrices (SRTMs).
- Adopt and maintain a customer notification and enforcement process for implementing IS security policy changes, in coordination with the Office of Expeditionary Operations (IX) GPOCs and in coordination with IX support contractors.
- Conduct periodic reviews to ensure compliance with the SSP. Conduct these compliance reviews no later than three business (3) days following notification of a reported incident.
- Ensure configuration management (CM) for security-relevant IS software, hardware, and firmware is maintained and documented by means that include monthly review of firmware versions for hardware models contained in IX inventory and notify customer of required updates.
- Ensure the development of system assessment documentation by reviewing and endorsing such documentation and recommending action to the Authorizing Official/Delegated Authorizing Official (AO/DAO).
- Ensure approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output and provide procedures and SOP to GPOC and IX support contractors.
- Maintain as required by the AO/DAO and other regulatory guidance, a repository for all current and historic system assessment documentation and modifications.
- Coordinate and conduct IS security inspections, tests, and reviews as tasked by the IX Government Information Security Manager (GPOC) in coordination with the applicable Program/Project Manager (PM).
- Develop, review, and update procedures for responding to security incidents and for investigating and reporting (to IX management, the AO/DAO Representative, and local management) security violations and incidents, as appropriate coordination with GPOC.
- Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system in coordination with GPOC.
- Ensure data ownership and responsibilities are established for each IS, to include accountability, access rights, and special handling requirements.
- Develop, implement, review, and update procedures for authorizing the use of software, hardware, and firmware on the system.
- Formally notify the AO/DAO when a system no longer processes intelligence or SAP information.
- Formally notify IX management and the AO/DAO when changes occur that might affect assessment and authorization.
- Ensure that system security requirements are addressed during all phases of the system life cycle.
- Develop and maintain A&A status documents.
- Provide applicable security engineering input to development project documentation, requirements reviews, and design reviews and testing of the systems CONUS AND OCONUS.
- Provide security engineering advice and guidance to the ISSO, ISSE, Security Control Assessor (SCA), and OCIO in support of the Intelligence Community Program Manager(s).
- Maintain a knowledge base of system functions, security policies, technical security safeguards, and operational security measures.
- Create and update existing Standard Operating Procedures (SOP).
- Test and enforce IS security policies. Specifically: Perform tests and scans, using Intelligence Community accepted scanning tools (software and hardware), used either remotely or locally on the systems to ensure compliance and to identify security holes, risks, threats, and gaps. Completed scans will require transferring from non- networked systems to Xacta following Intelligence Community established policies for Data Transfer Officers. Write reports to include Plan of Action and Milestone (POAM) documents as a result of scanning that identifies security issues on the system. Perform on a monthly basis for up to 16 SPIDS under continuous monitoring protocols and standards with up to 1200 controls per SPID.
- Review System Security Plans (SSPs), test the documented systems, and endorse those found to be acceptable.
- Ensure new baseline software is added to the agency-approved whitelist using approved agency process.
- Evaluate and/or create and staff, as needed, system security plans (SSPs), System Security Authorization Agreements (SSAAs), CONOPS, ISA, MOU/A, network and system diagrams, Security Requirement Traceability Matrixes (SRTMs), and other IS documentation in coordination with GPOC.
- Evaluate Intelligence Community classified and unclassified IS to determine if the systems meet national, DoD, IC, and Intelligence Community security requirements for processing at the specified classification level.
- Establish testing requirements, coordinate, and conduct formal assessment testing.
- Perform vulnerability assessments, determine residual security risks, prepare assessment test finding reports, and provide formal authorization recommendations.
- Provide Data Transfer Officer (DTO) duties for IX requests as needed.
Qualifications:
- 5+ Years of related field or work experience
- Valid certification to meet DoDI 8570.01-M and DoDD 8140.01 Level II requirements.
- Demonstrated experience with Risk Management Framework assessment and authorization activities and processes.
- Demonstrated experience with vulnerability management.
- Demonstrated understanding of cybersecurity best practices.
- Demonstrated technical understanding of physical, virtualized, and cloud computing.
- Demonstrated understanding of computer networking.
Desired Skills:
- Ability to effectively communicate cybersecurity concepts to partners, stakeholders, and customers.
Clearance:
- Active TS/SCI required