Torch Technologies has an exciting opportunity for a Cybersecurity Engineer (ISSO) located Kettering, OH (Dayton/WPAFB area) to support two programs on our EPASS GB contract. As part of the AFLCMC/GB Business and Enterprise Systems Directorate (BES), the Requirements Management System (RMS) is used to forecast/determine, budget, and procure the range and depth of aircraft spare parts requirements based on aircraft and depot maintenance usage and readiness and sustainability goals. RMS supports the warfighter by computing procurement requirements for spares and determining depot level maintenance repair needs for the AF. RMS encompasses the automated and manual functions involved in the materiel requirements process. This process forecasts and controls procurement and repair requirements of materiel needed for logistics support of AF operated weapon systems. The warfighter aircraft maintainer benefits by having availability of the correct mix of spare parts to satisfy planned weapon system quantities and capabilities. The materiel involved is in direct support of the AF weapon systems and has a significant impact on the AF's ability to carry out its mission. RMS addresses the AFMC top-level Mission Essential Tasks and Objectives of Supply Management: “Provide and deliver repairable and consumable items (right product – right place – right time – right price).
ESSENTIAL DUTIES/POSITION DESCRIPTION:
This position requires a highly motivated individual with cybersecurity to provide the PMO/Capability Development Manager (CDM) cybersecurity support per DoDI 8500.01. Support includes assessing and continuously monitoring cybersecurity risk ensuring that legacy and new capabilities adhere to enterprise standards such as Risk Management Framework (RMF), Cybersecurity Framework (CSF), and National Institute of Standards and Technology (NIST) and per Authorization Official’s Information System’s Continuous Monitoring (ISCM) strategy.
The Information System Security Officer (ISSO) is responsible for ensuring the appropriate operational security posture is maintained for the assigned IT. This includes the following related to maintaining situational awareness and initiating actions to improve or restore cybersecurity posture:
• Implements and enforce all AF cybersecurity policies, procedures, and countermeasures.
• Completes and maintains required cybersecurity certification IAW AFMAN 17-1303.
• Ensures all users have the requisite security clearances and need-to-know, complete annual cybersecurity training, and are aware of their responsibilities before being granted access to the IT according to AFMAN 17-1301. Maintains all authorized user access control documentation IAW the applicable AF Records Information Management System.
• Ensures software, hardware, and firmware complies with appropriate security configuration guidelines, e.g., security technical implementation guides/security requirement guides.
• Ensures proper configuration management procedures are followed prior to implementation and contingent upon necessary approval.
• Coordinate changes or modifications with the system-level ISSM, SCA, and/or the Wing Cybersecurity office.
• Initiates protective or corrective measures, in coordination with the ISSM, when a security incident or vulnerability is discovered.
• Reports security incidents or vulnerabilities to the system-level ISSM and wing cybersecurity office according to AFI 17-203, Cyber Incident Handling; and,
• Initiates exceptions, deviations, or waivers to cybersecurity requirements.
The Information Systems Security Officer (ISSO) has the knowledge, experience and demonstrated ability to perform tasks related to the technical/professional discipline they are performing. Typically works independently and applies the proper procedures and processes related to their area of expertise. Has the ability to problem solve and troubleshoot various situations to develop successful outcomes within established program/project guidelines. Work is performed independently or under the oversight of more senior contractor employees (Program Office and Staff Level Support interface).
All Cybersecurity professionals should possess experience providing guidance on the following to include, but not limited to:
• Access control.
• Configuration management.
• System and communications protection.
• Contingency planning.
• Incident handling.
• System and information integrity.
• Security and privacy training and awareness; and,
• Software development activities, software and tools related to Cybersecurity.
Experience performing cybersecurity duties as outlined in DoDI 8500.01, AFI 17-130, and AFI 17-1301 for assigned AF IT.
Experience validating, evaluating and analyzing finding results and developer adjudications using automated testing tools, e.g., Fortify, Checkmarx, SonarQube, and AppScan.
Experience utilizing DoD tracking systems to input/document cybersecurity deficiencies, vulnerabilities, and change requests in the appropriate tracking system for each program, e.g., Jira, HP ALM, and eMASS.
Experience with conducting information security continuous monitoring (ISCM) by maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions IAW approved ISCM strategy.
EDUCATION:
Bachelor’s or Master’s Degree in a related field and at least three years of experience in the respective technical/professional discipline being performed, three of which must be in the DoD
OR, seven years of directly related experience with proper certifications, five of which must be in the DoD.
CERTIFICATION REQUIREMENTS:
At a minimum, the successful candidate will meet the requirements for and maintain a DoD 8570.01 IAT Level II Cybersecurity certification by possessing one of the following certifications:
• Cisco CCNA Security
• CompTIA CSA+/CySA+
• GIAC GICSP
• CompTIA Security+ CE
• (ISC)2 SSCP
• GIAC GSEC
• EC-Council CND
Candidate must be a US Citizen - REQUIRED
Candidate must possess and be able to maintain a T3/SECRET Clearance - REQUIRED
U.S. Citizenship Required for this Position: Yes
Job Type: Regular Full-time
Security Clearance: Secret
Schedule: 40 Hrs/week
Work Location: Kettering, OH
Travel: 0-10%
Relocation Assistance Available: No
Position Contingent Upon Award of Contract: No
Benefits:
Torch Technologies is proud to offer a stable and professional work environment, a competitive salary, and an excellent, comprehensive benefit package including: ESOP participation, 401(k) match and safe-harbor contribution, medical, dental, vision, life insurance, short-term disability, long-term disability, flexible spending accounts, Health Saving Accounts and Health Reimbursement Accounts, EAP, education assistance, paid time off, and holidays.
Applying to Torch Technologies:
Only those candidates invited for an interview will be contacted. Employment at Torch Technologies is contingent upon the successful completion of a comprehensive background check.
Torch Technologies is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Employment Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability or any other protected class.
#LI-EW1