Current jobs related to Cybersecurity Lead - Liberty - Bravura Information Technology Systems, Inc

  • Cybersecurity Manager

    2 weeks ago


    Liberty, Missouri, United States System One Full time

    Job Overview:The Cybersecurity Manager at System One is responsible for leading a team of cybersecurity professionals in monitoring and protecting the organization's IT network from potential threats. This role requires a strong understanding of cybersecurity technologies and a proven track record of identifying and mitigating risks.Key Responsibilities:•...


  • Liberty, United States System One Full time

    Job Summary: The Remote IT Cybersecurity Manager is responsible for managing a team of individuals that will collaboratively monitor information flowing inside and outside of our IT network, monitoring cybersecurity threats, and identifying measures to protect the integrity of information systems and data. Essential Functions: Trains employees...


  • Liberty Lake, Washington, United States F5 Full time

    About F5F5 is a leading provider of digital transformation solutions, empowering organizations to create, secure, and run applications that enhance the digital experience. Our teams are passionate about cybersecurity, innovation, and customer success.Job DescriptionWe are seeking an entry-level Business Development Representative to join our Digital Sales...


  • Liberty Lake, WA, United States F5 Full time

    At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation.Key ResponsibilitiesContribute to...


  • Fort Liberty, United States General Dynamics Information Technology Full time

    Type of Requisition:PipelineClearance Level Must Currently Possess:Top Secret/SCIClearance Level Must Be Able to Obtain:Top Secret SCI + PolygraphSuitability:Public Trust/Other Required:NoneJob Family:Cyber SecurityJob Qualifications:Skills:Cyber Defense, Cybersecurity, Incident ResponseCertifications:Experience:10 + years of related experienceUS Citizenship...

Cybersecurity Lead

3 months ago


Liberty, United States Bravura Information Technology Systems, Inc Full time

Role: Cybersecurity Lead

Location: Ft. Liberty, NC

Education/Certifications: CISSP or equivalent (IAM Level III)

Years of Experience: 7+ years general cybersecurity experience and 5+ years’ experience managing artifact development, documentation, and RMF tasks

ClearanceLevel & Investigation: Secret

IA Cert Level (DoD 8570.01): IAM Level III (CISSP or equivalent)

Computing Environment Certifications: Required

JobDescription:

Qualifications:

  • Requires CISSP or industry equivalent IAM level III certification.
  • Must possess relevant CE certification from DoD 8570.01-M series.
  • Requires 5+ years prior experience managing artifact development, documentation and associated tasks supporting RMF.
  • Requires 7+ years’ experience in general Cybersecurity knowledge, skills, and abilities, including:
    • Understanding of network and host-based security devices (i.e. Intrusion Prevention Systems, Intrusion Detection Systems, Firewall, Proxy servers, sensors, Switches, Routers, Hubs), and their role in moving packets securely from source to destination.
    • Understanding of security requirements, testing, assessment & validation procedures, best practices applicable to physical, virtual, & cloud (IaaS, PaaS, SaaS) based environments.
    • Knowledge of information security technologies (i.e. cryptography, biometrics, forensic analysis, vulnerability assessment, SIEM).
    • Understanding of Federal and DoD computer security directives, e.g., STIGs, and FISMA.
    • Understanding of NIST and commercial best practices.
    • Knowledge of applicable Department of Army, NETCOM, and Customer security guidelines and best practices.
    • Demonstrate an understanding of DoD directives applicable to implementation of RMF.
    • Display professionalism in written communication, verbal expression, effective briefing techniques.
  • Security Clearance –SECRET.

Responsibilities:

  • Support deployment of all approved changes, emergent upgrades, and enhancements of GFE, COTS, and GOTS systems.
  • Ensure IA compliancy and provide appropriate system T&E records, reports, and artifacts to be consider for document injection for the DoD RMF repository.
  • Provide resource support for patch deployment developments.
  • Confirm IA compliancy criteria and requirements accomplished during performance of hardware/software testing and integration.
  • Provide overall management for Customer cybersecurity program, including compliance monitoring, incident response, change management, and cloud security.
  • Consolidate, assess applicability, and provide artifacts to ISSO or designated program personnel in support of RMF accreditation packages and maintain ATO certifications for networked, closed-restricted network, stand-alone systems, appliances, servers, workstations, and applications used by the organization.
  • Contribute to verification and validation of system security posturing, risk assessments, security testing and evaluations, and contingency planning; support cybersecurity threat monitoring, including system scanning and risk identification and mitigation.
  • Maintain ISO IAW DoD RMF and provide document creation services to support artifacts required for ATO process.
  • Develop strategy for continuous monitoring of effectiveness for system-specific security controls and recommended changes to system in support of RMF Categorize.
  • Coordinate with Organizational ISSM or designated program personnel to transition security control requirements to implementation team and track and report status.
  • Gather and develop artifacts and provide documentation to designated personnel.
  • Coordinate with designated personnel to initiate initial remediation actions and provide required artifacts to track and document remediation actions.
  • Manage the Authorize Information System.
  • Develop POA&Ms based on findings and recommendations; track and report status on current milestones and provide monthly report.
  • Manage the Monitor Security Controls
  • Review reported security status IAW Customer Continuous Monitoring Strategy document and recommend remediation activities; track and report findings.
  • Attend weekly CM meetings; provide cybersecurity concerns for change requests.
  • Work with Customer to address assess only requirements and resolve issues; assess and document identified risk and provide recommendations to reduce and eliminate identified risks for all new hardware, software, and appliances that require RMF Assess Only authorization.
  • Develop, manage, and maintain required documentation to support local TSP; update applicable documentation to reflect changes, additions, or decommissioning.
  • Report, investigate, coordinate containment, and oversee clean-up of reported security incidents; report initial incident within 1 hour of notification and provide AAR within 24 hours of closure.
  • Develop quarterly incident response team exercise schedules and scenarios; lead quarterly exercises/training efforts; provide training material for approval 1 week prior to session.
  • Gather and maintain system configuration information to monitor unclassified/classified systems for compliance with command security policies; perform monthly vulnerability scanning and analysis; perform on-request validation scans; report vulnerability scanning results within 1 business day; identify vulnerabilities & potential remediation actions; and compile reports/analysis.
  • Verify currency of stand-alone and development network ACAS licenses.
  • Review monthly SCAP results against servers and remediate findings; provide executive summary and report to the Customer.
  • Develop STIG Management policy and conduct monthly reviews of STIG checklists and POA&Ms for completion and accuracy.
  • Review new/updated PPS worksheets and recommend approval/disapproval.
  • Conduct monthly Flying Squirrel scans and provide analysis and recommendations.
  • Obtain and maintain approval as Data Transfer Agent and provide ad hoc data transfer support; conduct and document requests for data transfers within 72 hours; log data transfers and maintain data for auditing purposes.
  • Apply risk management approach to evaluate cloud technologies and provide risk and cybersecurity assessments.
  • Attend all cloud migration initiative meetings, adhere to cybersecurity governance for test and evaluation services, track and publish monthly processing time and service levels, and maintain workload data for monthly report.
  • Demonstrate experience managing artifact development, documentation and associated tasks supporting RMF.
  • Support ARTIMS team to achieve ATO to establish ARTIMS as cloud ready system.
  • Demonstrate knowledge of E-MASS to make and keep updated ARTIMS EMASS entry as Assess.
  • Fully coordinate ARTIMS Cybersecurity tasks with ARTIMS Team Lead; participate in meetings and planning sessions.