Cybersecurity Engineer

Peterson, SFB, Colorado Springs, CO, US

Applications have closed

Job Summary: 
ITS, LLC. is seeking a Cybersecurity Engineer to join our Colorado Springs team. This is an exciting opportunity to support the United States Space Force (USSF). The Space Systems Command has the collective USSF mission responsibility for the development, deployment, maintenance, and sustainment of space systems providing early missile warning capability; environmental sensing; precision navigation, guidance, and timing; nuclear event detection; space launch capability; national and military satellite communications capabilities; launch range and network systems; advanced systems; and technology development programs. This position will work in close collaboration with the Information Systems Security Manager (ISSM) and Information Systems Owner (ISO) to ensure security posture is met and maintained, develops security policies, procedures, plans, and all other evidence of compliance with various security controls. Creates and maintains RMF documentation to include Enterprise Mission Assurance Support Service (eMASS) and Information Technology Investment Portfolio Suite (ITIPS) database entries with System Security Plans (SSP), Security Assessment Reports (SAR), Plans of Action & Milestones (POA&M), all other artifacts and documentation tied to the NIST processes. You will provide support to maintain a strong cybersecurity posture for the system until its disposal. 

Key Responsibilities: 

  • Build, maintain, and track the system’s cybersecurity baselines via eMASS or equivalent, IAW cybersecurity policies, guidance, and plans;
  • Review, assess, create, and update enclave documentation in eMASS and any Configuration Management (CM) system for the ISSM review and approval, such as Security Plan, Security Assessment Plan, Category selection checklist, control results, and POA&Ms
  • Identify, collect, review, and maintain RMF-required artifacts IAW cybersecurity policies, guidance, and plans;
  • Ensure accurate system documentation and configuration logs are maintained to reflect current and prior configuration baselines;
  • Provide written evaluations portraying system progress on RMF compliance IAW cybersecurity guidance (one evaluation for each system per quarter);
  • Maintain cybersecurity data for systems registered in the ITIPS IAW FISMA requirements;
  • Conduct and/or report annual FISMA security reviews, contingency test completion dates, and validation of cybersecurity control compliance, IAW cybersecurity guidance, the organizational cybersecurity strategy, and POA&M
  • Conduct annual control validations (ACVs) for all NC3 systems IAW AF Global Strike Command (AFGSC) cybersecurity guidance and for all non-NC3 systems in a similar manner but in accordance with SMC/ECP policies and schedule;
  • Create and maintain mission common control packages and serve as the common control provider for each mission system;
  • Create and maintain Authority-to-Connect (ATC) guest system packages in eMASS for non-USSF systems connected to SMC/ECP systems;
  • Ensure the required Cybersecurity functional activities and actions during the systems’ O&S phase are conducted IAW. 
  • Cybersecurity-related laws and regulations such as the National Cybersecurity Protection Act, FISMA, OMB A1-30 mandate, and EO 13636;
  • Improving Critical Infrastructure Cybersecurity and Resilience, including policies, standards, special publications, instructions, and guidance from the DoD, Military, NIST, CNSS, Defense Information Systems Agency (DISA), and Department of the AF (DAF);
  • Participate in the system’s IPTs and sustainment contractor meetings/teleconferences, change control boards (CCBs), and working groups (WGs) to ensure the continued alignment of cybersecurity requirements in the technical baselines, the system security architecture, information flows, design, and the security controls;
  • Evaluate the system’s sources of changes, such as Deficiency Reports (DRs), Problem Reports (PRs), Change Requests/Proposals (CRs/CPs), Request For Change (RFC), and AF Form 1067s; determine the security impacts of proposed or actual changes to the system, environment, threats, and vulnerabilities; and if any, update all needed RMF artifacts to reflect the changes/revisions;
  • Review and provide inputs to modification packages, program/system documents and support agreements updates, and communications and network infrastructure upgrades to ensure proper cybersecurity configuration modification management and planning support are implemented;
  • Review system’s test plans and test results and, if necessary, observe system testing for security control implementation IAW cybersecurity policies, guidance, and plan;
  • Document all findings. Perform security impact analysis on any system change and appropriately prepare letters of assurance, security impact letters, and risk assessment letters to include exceptions, deviations, or waivers to cybersecurity requirements when applicable;
  • Monitor and adhere to the system’s A&A schedule deadlines IAW the Program Office’s Cybersecurity Plan and IPT’s schedule;
  • Review annually and provide recommended updates to program cybersecurity policies and plans IAW cybersecurity guidance;
  • Review and provide advice on RMF-related memorandums of agreements/ memorandums of understanding/ service level agreements/ interconnection service agreements (MOA/MOU/SLA/ISA) for RMF compliance IAW cybersecurity policies, guidance, and plans;
  • Assist with the cybersecurity vulnerability management plan and risk assessment capability;
  • Receive and review ACAS and SCC reports from the sustainment contractor for each system quarterly and characterize risk for each system semi-annually.
  • Experience with XACTA, FISMA, eMASS, and/or TIPS
  • Experience with DoD RMF functions and processes and/or DISA IASE

Education/Experience: 

  • 0-2 years of technical experience in the cybersecurity field or a STEM Bachelor’s Degree
  • IAT or IAM Level 2 Certification per DoD 8570.01M

Clearance Requirement: 

  • Secret but TS or TS/SCI, preferably

Salary Note:

  • In compliance with Colorado's Equal Pay for Equal Work Act, the salary range for this role is based on education, experience, and responsibilities. 

ITS, LLC. is an equal-opportunity employer to include veterans and individuals with disabilities.

U.S. Citizenship is required.

Tags: ACAS Clearance CNSS Compliance DISA DoD DoDD 8570 DoD RMF eMASS FISMA IAM NIST Nuclear POA&M Risk assessment RMF Security assessment Security Assessment Report Security Impact Analysis STEM Strategy System Security Plan TS/SCI Vulnerabilities Vulnerability management

Region: North America
Country: United States
Job stats:  7  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.