B

TS/SCI Cybersecurity Engineer

Bailey Information Technology Consultants.
On-site
Springfield, Virginia, United States


Bailey Information Technology Consultants (BITC) is currently seeking an experienced Cybersecurity Engineer to support our customer in Springfield, Virginia (primary location) and Bluemont, Virginia.

Job Title: Cybersecurity Engineer


Location: Springfield, VA and Bluemont, VA (as needed for scanning, DTO, etc.)


Security Clearance Required: TS/SCI


Skill Level 3-IXST



Duties include:

  • Develop, write, and maintain a formal Information Systems Security Program (ISSP) that includes all applicable security Information Systems (IS) documentation in accordance with NGA/OCIO policies for up to 16 SPIDS under continuous monitoring protocols and standards, including, but not limited to: Concept of Operations (CONOPS), System Security Plans (SSPs), System Security Authorization Agreements (SSAAs), Security-related Interconnection Security Agreements (ISAs), Memorandums of Understanding/ Agreement (MOUs/MOAs), Network and system diagrams and Security Requirement Traceability Matrices (SRTMs).

  • Adopt and maintain a customer notification and enforcement process for implementing IS security policy changes, in coordination with the Office of Expeditionary Operations (IX) GPOCs and in coordination with IX support contractors.

  • Conduct periodic reviews to ensure compliance with the SSP.  Conduct these compliance reviews no later than three business (3) days following notification of a reported incident.

  • Ensure configuration management (CM) for security-relevant IS software, hardware, and firmware is maintained and documented by means that include monthly review of firmware versions for hardware models contained in IX inventory and notify customer of required updates.

  • Ensure the development of system assessment documentation by reviewing and endorsing such documentation and recommending action to the Authorizing Official/Delegated Authorizing Official (AO/DAO).

  • Ensure approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output and provide procedures and SOP to GPOC and IX support contractors.

  • Maintain as required by the AO/DAO and other regulatory guidance, a repository for all current and historic system assessment documentation and modifications.

  • Coordinate and conduct IS security inspections, tests, and reviews as tasked by the IX Government Information Security Manager (GPOC) in coordination with the applicable Program/Project Manager (PM).

  • Develop, review, and update procedures for responding to security incidents and for investigating and reporting (to IX management, the AO/DAO Representative, and local management) security violations and incidents, as appropriate coordination with GPOC.

  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system in coordination with GPOC.

  • Ensure data ownership and responsibilities are established for each IS, to include accountability, access rights, and special handling requirements.

  • Develop, implement, review, and update procedures for authorizing the use of software, hardware, and firmware on the system.

  • Formally notify the AO/DAO when a system no longer processes intelligence or SAP information.

  • Formally notify IX management and the AO/DAO when changes occur that might affect assessment and authorization.

  • Ensure that system security requirements are addressed during all phases of the system life cycle.

  • Develop and maintain A&A status documents.

  • Provide applicable security engineering input to development project documentation, requirements reviews, and design reviews and testing of the systems CONUS AND OCONUS.

  • Provide security engineering advice and guidance to the ISSO, ISSE, Security Control Assessor (SCA), and OCIO in support of the NGA Program Manager(s).

  • Maintain a knowledge base of system functions, security policies, technical security safeguards, and operational security measures.

  • Create and update existing Standard Operating Procedures (SOP). 

  • Test and enforce IS security policies.  Specifically: Perform tests and scans, using NGA accepted scanning tools (software and hardware), used either remotely or locally on the systems to ensure compliance and to identify security holes, risks, threats, and gaps.  Completed scans will require transferring from non- networked systems to Xacta following NGA established policies for Data Transfer Officers.  Write reports to include Plan of Action and Milestone (POAM) documents as a result of scanning that identifies security issues on the system.  Perform on a monthly basis for up to 16 SPIDS under continuous monitoring protocols and standards with up to 1200 controls per SPID.

  • Review System Security Plans (SSPs), test the documented systems, and endorse those found to be acceptable.

  • Ensure new baseline software is added to the agency-approved whitelist using approved agency process.

  • Evaluate and/or create and staff, as needed, system security plans (SSPs), System Security Authorization Agreements (SSAAs), CONOPS, ISA, MOU/A, network and system diagrams, Security Requirement Traceability Matrixes (SRTMs), and other IS documentation in coordination with GPOC.

  • Evaluate NGA classified and unclassified IS to determine if the systems meet national, DoD, IC, and NGA security requirements for processing at the specified classification level.

  • Establish testing requirements, coordinate, and conduct formal assessment testing.

  • Perform vulnerability assessments, determine residual security risks, prepare assessment test finding reports, and provide formal authorization recommendations.

  • Provide Data Transfer Officer (DTO) duties for IX requests as needed.




Required Skills:

  • Valid certification to meet DoDI 8570.01-M and DoDD 8140.01 Level II requirements.

  • Demonstrated experience with Risk Management Framework assessment and authorization activities and processes.

  • Demonstrated experience with vulnerability management.

  • Demonstrated understanding of cybersecurity best practices.

  • Demonstrated technical understanding of physical, virtualized, and cloud computing.

  • Demonstrated understanding of computer networking.




Desired Skills:

  • Ability to effectively communicate cybersecurity concepts to partners, stakeholders, and customers.