Cyber Compliance SME
Arlington, VA
GCyber
GCyber, a leading government IT contractor, specializes in empowering U.S. Defense and Federal agencies with cutting-edge technology solutions. We provide top-tier Infrastructure and Operations, Security and Risk Management, and Portfolio &...GCyber is hiring a Cyber Compliance Subject Matter Expert to support the Defense Information Systems Agency (DISA).
As the Cyber Compliance SME, you will:
- Serve as the knowledge expert of all security-related aspects of the computing environment.
- Provide expertise in implementing and maintaining security postures within complex network architectures.
- Provide expertise in Defense in Depth concepts supporting DoD infrastructures, A&A, physical and personnel security concepts.
- Provide the appropriate level of confidentiality, integrity, availability, authentication, and non-repudiation IAW DoD 8500.01, DoD 8500.2, Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01, NIST 800-37 Risk Management Framework, NIST 800-137 Information Security Continuous Monitoring, as well as local security policies created and enforced by the Cyber Security Center.
- Work in support of customer organizations to integrate and automate IA solutions.
- Establish a robust security posture for the IT environment by independently identifying vulnerabilities, remediating found vulnerabilities, and improving processes to maintain a robust security posture as it pertains to the Information System (IS) vulnerability management.
- Ensure that all managed assets are compliant and communicating with all required security tools, such as HBSS, ACAS, Splunk, Tanium and SCCM.
- Provide System/Windows updates. Support all versions of the standard image security updates and policies to include technology enhancements, upgrades, and/or replacements and address security vulnerabilities as prescribed by DoD orders which include U.S. Cyber Command (USCYBERCOM), JFHQ DODIN and DISA.
- Provide computer security response support. Provide immediate response in the investigation of computer security incidents in line with CJCSM 6510.01.
- Ensure all assets are fully compliant with JFHQ-DODIN OPORDS, TASKORDs (10-12 a month), IAVM notifications and STIG requirements per published compliance dates.
- Provide compliance support. Ensure all assets are fully compliant with JFHQ-DODIN OPORDS, TASKORDs (10-12 a month), IAVM notifications and STIG requirements per published compliance dates.
- Provide compliance with IA, Hardware, Software, Procedural, Physical, and Personnel Security Inspections Support. Assist the Government Security/IA Manager(s) in the development, implementation, and execution of a facility-wide, fully compliant security program for all aspects of Physical Security, Personnel Security, IA Security, Communications Security, and Government-required compliance monitoring, reporting, and tracking.
- Provide RMF program and processes that enables system owners to ensure systems are compliant and operating under appropriate security and assurance controls for the full system lifecycle.
- Support the Connection Approval Program (CAP), A&A Support and Tenant Security Plan (TSP). Support all activities needed to obtain A&A on all the tenant networks, equipment, and systems at all classification levels.
Minimum Qualifications and Experience:
- Active DoD Top Secret Clearance
- BS in Computer Engineering, Computer Information Systems, Telecommunications, or Management Information Systems, or 5 recent years of documented relevant experience.
- IAT Level II Baseline Certification (e.g., Security+, CCNA Security, CySA+, GICSP, GSEC, CND, SSCP)
- Knowledge of the DoD IAVM programs, the DISA Vulnerability Management System (VMS) and the Continuous Monitoring Risk Scoring system (CMRS).
- Knowledge of the DoD vulnerability scanning requirements utilizing DOD DRSI Standards and Tools.
- Experience in FISMA, OMB, DoD IG Inspection, ACA, and other accreditation and certification programs.
- 3 years’ experience securing Operating Systems to comply with DISA STIGs; network experience configuring and maintaining desktop firewalls.
- Knowledge of the Defense in Depth concepts and implementation.
- Knowledge of A&A processes RMF NIST SP-800-37.
- Knowledge of NIST SP 800-53R Common Control documentation and validation.
- Knowledge of Incident Response, Auditing, and CNDSP.
- Knowledge of Cyber tools HBSS and ACAS.
- Experience/knowledge with Splunk, Tanium.
- Experience with deploying patch and hot-fixed mitigation implementations with deadlines for various Operating System Platforms utilizing tools such as Red Hat Satellite Server, YUM Server, Microsoft Endpoint Configuration Manager (EPCM), Group Policy, PowerShell scripting, or Tanium.
Physical Requirements:
- Sitting for long periods
- Standing for long periods
- Ambulate throughout an office.
- Ambulate between several buildings.
- Stoop, kneel, crouch, or crawl as required.
- Travel by land or air transportation 25% or less
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: ACAS Audits Clearance CND Compliance DISA DoD Firewalls FISMA GICSP GSEC Incident response Monitoring NIST PowerShell Red Hat Risk management RMF Scripting Splunk SSCP STIGs Top Secret Top Secret Clearance Vulnerabilities Vulnerability management Windows
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Cloud Security Architect jobs
- Open Product Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Senior Product Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Chief Information Security Officer jobs
- Open Cyber Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open IT Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Manager Pentest H/F jobs
- Open Security Operations Analyst jobs
- Open Security Consultant jobs
- Open IT Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Senior Network Security Engineer jobs
- Open Information Security Architect jobs
- Open C-related jobs
- Open CISM-related jobs
- Open Risk assessment-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open ISO 27001-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Analytics-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open Threat intelligence-related jobs
- Open Security assessment-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open DoD-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open DevOps-related jobs
- Open APIs-related jobs
- Open Splunk-related jobs
- Open IDS-related jobs
- Open IPS-related jobs
- Open Kubernetes-related jobs