Logo
Columbus Technologies

Cybersecurity Specialist

Columbus Technologies, Huntsville, Alabama, United States, 35824


Overview:

Must be US Citizen with the ability to obtain a Secret Clearance. Onsite at NASA's Marshall Space Flight Center in Huntsville, AL Position is currently hybrid however may transition to onsite by end of the year.Ongoing fully benefitted W2 position The US pay for this full-time position is $37.50 per hour. Salary ranges are determined by role, level, and location. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.

The Cybersecurity Specialist will be responsible to implement and execute risk management processes by utilizing National Institute of Standards and Technology (NIST) 800 series special publications, Federal Information Processing Standards (FIPS), and Federal Information Security Modernization Act (FISMA) compliance frameworks. The Cybersecurity Specialist will work in a collaborative unified team environment to monitor, evaluate, and manage the risk posture of systems authorization boundary to safeguard information systems by leveraging robust understanding of NIST Risk Management Framework (RMF). This position will involve working closely with the organizations IT teams to identify vulnerabilities, conduct security control assessments, perform risk analysis and assessments, develop security strategies for mitigating and resolving findings, provide cybersecurity compliance guidance to IT teams and ensure systems remain compliant with federal standards and regulations.Responsibilities:Mid-level Cybersecurity support. Applies advanced knowledge of concepts, processes, practices, and procedures on technical assignments. Suppo1ts enterprise Cybersecurity standards. Suppo1ts the development and implementation of Cybersecurity standards and procedures.Coordinates, development, and makes recommendations of security programs for an organization. Coordinates, development, and makes recommendations of security programs for an organization. Recommends Cybersecurity solutions to support customers' requirements. Identifies and reports security violations. Recommends and satisfies Cybersecurity requirements based upon the analysis of CSPP, policy, regulatory, and resource demands. Supports customers at the highest levels in the development and implementation of processes and policies. Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures. Supports analysis, design, and development of security features for system architectures. Analyzes and recommends security requirements for computer systems which may include mainframes, workstations, and personal computers. Support designing, development, engineering, and implementation of solutions that meet security requirements. Supports integration and implementation of the computer system security solution. Analyzes general Cybersecurity related technical problems and provides basic engineering and technical support in solving these problems. Supports vulnerability/risk analyses and makes recommendations of computer systems and applications during all phases of the system development life cycle. Performs all procedures necessary to ensure the safety of information systems data assets and to protect systems from intentional or inadvertent access or destruction. Ensures that all information systems are functional and secure.Key Responsibilities:Supports the Cybersecurity Program by managing Authorization Packages (AP) to include PrivacyAnalysis, System Categorizations, Risk Assessment Reports (RAR), System Security Plan (SSP), andgeneral Assessment and Authorization (A&A) oversight to obtain or maintain a systems Authorizationto Operate (ATO)Focal point for enterprise SSPs managing the security posture by supporting Information SystemOwners (ISO) and Information System Security Officials (ISSO) with RMF responsibilitiesDevelop and maintain accurate and effective Plans of Action & Milestones (POA&Ms) as part ofcontinuous monitoring for implementing cybersecurity improvementsCollaborate with Information System Administrators (ISA) and various Engineering teams tointegrate security measures into new and existing information systems and major applicationsStay up to date on general information technology innovations and emerging threats and securitytechnologies to continuously improve security postureQualifications:Required/Desired Qualifications:Must be US Citizen with the ability to obtain a Secret Clearance.Bachelor's degree in Cybersecurity, Management of Information Technology, or a relatedfield.Minimum 4 years experience in information security or related roles. 5-10 years experience preferred.Familiarity of networking ports and protocols, architecture of networked and standalonesystems, functionality of various operating systems, cloud computing environments andcommon security tools.Ability to digest and comprehend information system topology diagrams and Concept ofOperations documentationKnowledge with federal standards such as NIST, FISMA and FIPSExposure to FedRAMP program and standardsExposure to Security Control AuditsProficient with MS OfficeRelevant certifications (e.g., CompTIA Network+, Security+, CySA+) are a plus.