SUMMARY
Cypher Intelligence LLC is seeking a Cyber Security SME to support a cleared program in the WMA. The successful candidate will be responsible for initiating and maintaining Sponsor System Security Plans, IT procedures, and continuously monitoring and maintaining consistent system security posture.
DUTIES, TASKS, & RESPONSIBILITIES- The Contractor shall manage the end-to-end processes for generating and implementing IT system security plans.
- The Contractor shall manage the end-to end processes for Sponsor’s IT system certification and accreditation.
- The Contractor shall manage the Sponsor’s cloud-based computing missions.
- The Contractor shall document CONOPS, data workflows, and architecture as required for XACTA deliverables.
- The Contractor shall serve as the Sponsor’s focal point for mission information technology cyber security.
- The Contractor shall identify new technologies and assess their technical and performance characteristics.
- The Contractor shall create and maintain complex system designs, resolve engineering problems, and propose preventive strategies.
- The Contractor shall identify and provide agile approaches to the automation of manual and inefficient processes.
- The Contractor shall provide insight into industry trends and make recommendations on future direction for the program.
REQUIRED EXPERIENCE, SKILLS, & TECHNOLOGIES- Active/current TS/SCI with Polygraph
- Demonstrated experience performing system security scans and providing high level mitigation strategies to resolve security scan findings.
- Demonstrated experience performing Risk Management Framework activities.
- Demonstrated experience using the Linux operating system and command-line interface.
- Demonstrated experience participating or leading technical exchange meetings and documenting action items or results.
- Demonstrated experience installing, managing, and operating continuous monitoring support solutions including development of metrics for reporting and auditing.
- Demonstrated experience performing information security testing with commonly used tools, such as Nessus, AppDetective, or WebInspect.
- Demonstrated experience with security monitoring and audit analysis.