Please scroll down, To apply

Cyber Security Subject Matter Expert with Security Clearance

hiring now

Kratos Defense and Security Solutions

2024-09-28 08:38:06

Job location Huntsville, Alabama, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

Job Description Kratos Defense & Security Solutions, Inc., is a leading defense technology company focused on unmanned systems, satellite communications, cyber security/warfare, microwave electronics, missile defense, training, and combat systems. Our customers include the U.S. federal government, foreign governments, commercial enterprises, and state and local government agencies. At Kratos, we prioritize affordability as a cornerstone of our technology. We leverage proven, cutting-edge methodologies and technology to minimize costs, streamline schedules, and mitigate risks, ensuring timely delivery of cost-effective solutions to market. Kratos Defense & Rocket Support Services, Inc (KDRSS) is a division of Kratos Defense providing full spectrum solutions for complex C5ISR, engineering, and operational requirements and military weapon systems. We have years of experience in logistics, engineering, and target operations support, as well as international programs, rocket program services, technology initiatives, and advanced weapon system research and engineering. Our in-depth understanding of our client missions, in conjunction with the strategic location of our employees, enables us to offer cost effective solutions tailored to our clients' specific requirements and consistent with their evolving mission objectives. At KDRSS, we prioritize innovation, collaboration, and growth. Our team collaborates to cultivate a supportive and dynamic workplace, fostering creativity and promoting professional development while honoring personal and family lives. Join our team and help shape the future of technology within the defense industry today! Our Cybersecurity Subject Matter Expert will be responsible for managing the Information Systems (IS) security principles and policies, including the Risk Management Framework (RMF), Security Technical Implementation Guides (STIGs), 32 CFR Part 117 National Industrial Security Program Operating Manual (NISPOM), Defense Counterintelligence and Security Agency (DCSA) Assessment and Authorization Process Manual (DAAPM), DoD 5200.01 Information Security Program and Protection of Sensitive Compartmented Information (SCI), and DoD 5205.07 Special Access Program (SAP) Security Manual requirements for both our Customer's Cybersecurity requirements and our KDRSS company site. The new hire will safeguard secure networks against unauthorized modification, destruction, or disclosure. This individual will research, evaluate, design, test, recommend, communicate, and implement new security software or devices for sustain Customer requirements and new company site requirements. The new hire is expected to implement, enforce, communicate, and may develop classified network or other information security policies or security plans for data, internet, software applications, and hardware, telecommunications, and computer installations. Additionally, the selected inidividual will establish and maintain classified computer systems following DOD, NISPOM, and Joint Special Access Program Implementation Guide (JSIG), including but not limited to: Responsible for network address assignment, routing protocols, and routing table configuration as well as configuration of authentication and authorization. Utilize SIEM/SEM tools to conduct regular system auditing and conduct trend analysis. Develop Security Assessment Reports (SAR) and investigate environmental risk to create Risk Assessment Reports (RAR) Develops and maintains a formal information system (IS) security program. Develop and maintain System Security Plans (SSP) and related documentation such as the Plan of Action & Milestones (POA&M), Risk Assessment Report, and Continuous Monitoring Strategy. Develop, implements, and enforces IS security policies. Maintains the hardware and software that comprises the network (data, voice, and video); including the deployment, maintenance and monitoring of active network gear; switches, routers, firewalls, and appliances. Ensure audit records are collected and analyzed in accordance with policies and procedures. Responds to IS security incidents including investigation and report detail. Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures to restrict unauthorized use of data systems and databases. Ensures all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS Assist with the development and implementation of an effective IS security education, training, and awareness program. Conducts initial and annual required training of privileged and general users. Conduct proof of concept and present proposals for new hardware and software. Manages disaster recovery functions for information systems. Serve as member of the configuration change board (CCB). Assess changes to the system/operational needs that could affect system(s) accreditation. Voting/veto member of the CCB for all systems. Assume ISSO responsibilities as necessary and assist in other disciplines of Security as needed to support the program(s). Experience and Skills Education and Experience Required: Required to have and maintain a U.S. security clearance at the appropriate level (requires U.S. Citizenship). BS in Information Technology or Information Security is preferred. DoD 8570 IAM Level III certification (i.e., CISM, CISSP or GSLC) or the ability to obtain within 6 months from appointment is preferred. Six (6) or more years of relevant and demonstrated experience managing Information Systems (IS), robust understanding of security principles and policies to include RMF, STIGs, the NISPOM, the Defense DCSA's DAAPM, protecting and implementing SCI requirements, and including SAP Security Manual. Required Skills and Experience: Experience in designing, developing and integrating classified computer systems and isolated networks in compliance with government regulations. Must have working knowledge of TCP/IP, network switching, routing and infrastructure cabling. Must be able to configure switches by using work instructions. Must have solid work experience with Linux and Windows Operating Systems, DISA STIGS, and SCAP Compliance, including executing Security STIG/Hardening on Windows Operating Systems. Must have the ability to provide internal and external customer support related to desktop troubleshooting. Attention to detail with the ability to multi-task and follow through with task from start to completion. Must demonstrate ability to safeguard networks against unauthorized modification, destruction, or disclosure. Past performance researching, evaluating, designing, testing, recommending communicating and implementing existing and new security software or devices is key. Office and/or manufacturing environment. Ability to stand and sit for long periods of time. Ability to perform repetitive motion (keyboarding, 10-key, phones). May be required to lift up to 25 pounds May work extended hours or weekends and have on-call schedule/duties. Other duties may be assigned. Job Benefits Medical, Dental & Vision Insurance Coverage
Life/ADD & Short/Long Term Disability Insurance
401(k) Savings Plan
Employee Stock Purchase Plan (ESPP)
Paid Time-Off (PTO)
Holidays
Education Reimbursement

Inform a friend!

<!– job description page –>
Top