Ssd Anc
Information System Security Manager (IAM level 3)
Ssd Anc, Salt Lake City, Utah, United States,
Information System Security Manager (IAM level 3)
Hill AFB, UT, USA
Req #6477SSD is seeking an Information System Security Manager (IAM Lvl 3) with an active TS clearance.The contractor shall prepare Cybersecurity and Information Assurance (IA) documents and specifications used to protect critical program information. The contractor shall assess critical technologies required protection, Software Assurance (SwA) sensitivity analyses, aircraft system architectures, on-board communication protocols, program specific capabilities, threats/vulnerabilities, and critical program information. Per CDRL A001 and A002, the contractor shall submit deliverables in writing and update the deliverables in the technical source data, contained in the following master documentation:Requirements DrawingData Path IdentificationData Type IdentificationSystem Security Plan (SSP)Security Control Traceability Matrix (SCTM)Risk Assessment Report (RAR)Hardware and Memory Architectural Analysis Report (HAMMAR)Cybersecurity Impact Evaluation Recommendation (CIER)Interim Authority to Operate (IATT)Authority to Operate (ATO)Supply Chain Risk Management (SCRUM)Program Protection Plan (PPP)Criticality Analysis (CA)Counterintelligence Support Plan (CISP)Security Classification Guide (SCG)Cybersecurity Strategy (CSS)
#J-18808-Ljbffr
Hill AFB, UT, USA
Req #6477SSD is seeking an Information System Security Manager (IAM Lvl 3) with an active TS clearance.The contractor shall prepare Cybersecurity and Information Assurance (IA) documents and specifications used to protect critical program information. The contractor shall assess critical technologies required protection, Software Assurance (SwA) sensitivity analyses, aircraft system architectures, on-board communication protocols, program specific capabilities, threats/vulnerabilities, and critical program information. Per CDRL A001 and A002, the contractor shall submit deliverables in writing and update the deliverables in the technical source data, contained in the following master documentation:Requirements DrawingData Path IdentificationData Type IdentificationSystem Security Plan (SSP)Security Control Traceability Matrix (SCTM)Risk Assessment Report (RAR)Hardware and Memory Architectural Analysis Report (HAMMAR)Cybersecurity Impact Evaluation Recommendation (CIER)Interim Authority to Operate (IATT)Authority to Operate (ATO)Supply Chain Risk Management (SCRUM)Program Protection Plan (PPP)Criticality Analysis (CA)Counterintelligence Support Plan (CISP)Security Classification Guide (SCG)Cybersecurity Strategy (CSS)
#J-18808-Ljbffr