Vacancy expired!
- Support the Army CIO and G6 in coordination of cybersecurity initiatives across the Army in the areas of Risk Management, Network Modernization and other capabilities.
- Support the HQDA DCS G-6 with the requirements defined in DoDI 8500.0, DoDI 8510.01, AR 25-2 (Army Cybersecurity), DA PAM 25-2-14 (Risk Management Framework (RMF) for Army IT), and all other applicable Federal, NIST, DoD, and Army regulations, directives, instructions, orders, and memorandums.
- Provide Army Cybersecurity stakeholders technical implementation guidance
- Create a strategy, roadmap, and implementation plan for the integration of Operational Technology into the Army’s IT and Network Operations cybersecurity capability
- Support the modernization and implementation plan for a reformed and operationalized cybersecurity RMF, automation, and enabling a Continuous Assessment capability
- Support the G6 with developing and maintaining an enterprise data dictionary that is aligned to cybersecurity, data assets, the responsible organization group, definition and maintenance of the group's data landscape including overlays with the technology landscape, end-to-end data flows/transformations, and data lineage
- Support the G-6 with the requirements identified in the DoDI 8010.01 on developing, managing, and implementing the Commercial Temporary Exception to Policy (C-TEP) program
- Build, deliver, and implement the DA PAM that supports the C-TEP program.
- Maintain an inventory of all previous and current C-TEP packages and maintain Army’s portion of C-TEP registrations within the DoD System/Network Approval Process (SNAP) database.
- Provide the G-6 with RMF assessments via site visits through field teams and deliver baselines along with recommendations for implementing new industry strategies (e.g., RMF 2.0).
- Other duties assigned as needed.
- 5 years of experience analyzing and implementing Cybersecurity policies, processes and tools for Army/DoD clients.
- Experience working in Army Portfolio Management System (APMS) and eMASS is a must have
- Knowledgeable in the execution of system level continuous monitoring (CONMON), FISMA activities and RMF, FEDRAMP, DISA FEDRAMP, securing technologies through the use of applicable DISA Security Technical Implementation Guides (STIG), Security Requirements Guide (SRG), and defense and/or industry best practices
- Knowledge of Operational Technology (OT), to include Control Systems and critical infrastructure lifecycle management processes, governance, and technical knowledge of how to perform risk assessments to ensure they are cybersecure
- Working knowledge of security concepts, protocols, processes, architectures and tools (vulnerabilities, threats and exploitation, authentication & access control technologies, threat intelligence data and sources, WHOIS and DNS referential data and sources, intrusion detection/prevention capabilities, network traffic analysis, SEIM technology, incident handling, media/malware analysis, etc.)
- Working knowledge of networking concepts, protocols and architectures (OSI-model, TCP/IP, major application protocols such as DNS/HTTP/SMTP, LAN/WANs, VPNs, routers/routing, addressing, etc.)
- Detailed knowledge of intrusion detection engines, capabilities and signature formats in general, with experience with tools such as Snort/Sourcefire variations and regular expressions (REGEX)
- Knowledge of cybersecurity policy and issues, the global cyber community, roles of major organizations how they interrelate and interact, and challenges in these structures
- Demonstrated awareness of the common cyber products and services, an understanding of their limitations, and a comprehensive understanding of the disciplines of cybersecurity
- Proven ability to research and analyze data from a variety of sources and to present findings in clear and concise written reports
- Experience with Kali Linux and Metasploit or similar tools
- Experience with programming/scripting: Python, PowerShell, Ruby, C, JavaScript, etc
- Bachelor’s degree in Computer Science, Cybersecurity or related discipline
- Familiarity with:
- DoDI 8500.0, DoDI 8510.01
- AR 25-2, Army Cybersecurity
- DA PAM 25-2-14, Risk Management Framework (RMF) for Army IT
- Current DoD 8570 IAM Level II minimum/IAM Level III preferred
- Active TS/SCI preferred, or active Secret clearance with ability to upgrade to Top Secret (TS/SCI) if required