The SAPCO Cybersecurity Specialist is responsible for the oversight and execution of security compliance reviews of cleared defense industry locations that have been carved out of DSS?s oversight. Must be able to provide subject matter expertise (SME) on all program security disciplines.
In addition, they are responsible for supporting and executing the MSO/SID Self-Inspection programs. They must fulfill a variety of cybersecurity functions, to include: System Administrator, Enterprise Oversight, certification and accreditation, SAP and SCI assessment and authorization (A&A), Platform Information Technology (PIT) assessment and authorization, Information Assurance and Technical Security for AIS, Information Technology (IT) Network Administration & Support, and Information System Security Officer support. Will perform the IA tasks necessary to ensure that the existing DARPA IA program meets National, DoD, and DARPA IA standards, and continues to protect and defend DARPA information and Information Systems (IS) by ensuring the confidentiality integrity, availability, authentication, and non-repudiation of the systems.
The SAPCO Cybersecurity Specialist possesses experience in successfully participating in DoD Special Access Program Joint Certification and Accreditation, Assessment, and Approval events for DoD Joint cyber ranges and/or jointly accredited SAP information systems. The DARPA systems to be protected include systems that process and store information from controlled unclassified (CUI) up to Top Secret, including SAP and SCI caveats/compartments.
Duties shall include, but are not limited to the following:Provide subject matter expertise regarding all program security disciplines.Develop, manage, and execute the SAPCO Security Compliance Review process for those facilities carved out from DSS cognizance.Have experience conducting Industrial Security / Information Security program assessments IAW the NISPOM, the NISPOM Supplement Overprint, and/or the DoD 5200.01 Information Security Volumes 1-4.Write reports and coordinate Corrective Action Plans with industry performers and the respective DARPA PSO and PSRs.Prepare and distribute compliance review reports to the MSO/SID government lead for approval within 3 calendar days of each review.Oversee the successful closure of corrective action plans within 90 calendar days of issuance unless granted an extension by the MSO/SID government lead.Leverage DARPA Facility and Security Tracking System (DFASTs) to maintain insight and oversight of defense industry base performers requiring security compliance reviews.Have a clear and articulate understanding of risk management as it applies to security compliance reviews and experience in applying risk management principles and justification to security compliance overall ratings, as well as security discipline findings, deviations, and observations.The team must be capable of coordinating, conducting, recording, and closing-out at least 24 compliance inspections per fiscal year.Must possess experience in successfully meeting and participating in Defense Information System Agency (DISA), National Security Agency, and USCBYERCOM Computer Network Defense Program (CNDSP) and CBYERCOM Computer Readiness Inspections (CCRI)Experience with network security devices, classified Local Area Networks, Wide Area Networks, public key infrastructure (PKI), virtual machines, and end-point security solutions.Must be thoroughly familiar with, understand, and be able to apply the standards and requirements contained in the following:DoD Instruction 5220.22 National Industrial Security Program (NISPOM) Operating Manual, Chapter 8Defense Security Service Manual for the Certification and Accreditation of Classified Systems under the NISPOM Version 3.2DoD Directive 5205.16 The DoD Insider Threat ProgramNIST SP 800-53 Rev. 4, Security and Privacy Controls for Federal Information Systems and OrganizationsDoD Joint Special Access Program Implementation Guide (JSIG)Committee for National Security System Policy (CNSSP) Policy (CNSSP) No. 22 on Information Assurance Risk Management for National Security SystemsCNSSP No. 26 National Policy on Reducing the Risk of Removable MediaCommitted for National Security Systems Directive (CNSSD) No. 504 Directive on Protecting National Security Systems From Insider ThreatCommittee for National Security System Instruction (CNSSI) No. 1253 Security categorization and Control Selection for National Security SystemsDoDD 8000.1, Management of DoD Information Resources and Information TechnologyDoD Directive 8100.2, Use of Commercial Wireless Devices, Services, and Technologies in the DoD Global Information Grid (GIG)DoDD 8140.01 Cyberspace Workforce ManagementDoDI 8500.01 CybersecurityDoD Instruction 8510.01 Risk Management Framework (RMF) for DoD Information TechnologyDoD Directive 8530.1, Computer Network Defense (CND)DoD Instruction 8530.2, Support to CNDDoD Instruction 8551.1, Ports, Protocols, and Services Management (PPSM)DoD Manual 8570.01-M Information Assurance Workforce Improvement ProgramDCID 6/3, Protecting SCI within Information SystemsIntelligence Community Directive (ICD) 503Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01B Cyber Incident Handling ProgramDefense Federal Acquisition Regulation Supplement (DFARS)Clause 253.204-7012: Safeguarding Unclassified Controlled Technical InformationDoDI 8581.01 Information Assurance Policy for Space Systems Used by the Department of Defense
Note: The legacy cybersecurity/information security accreditation governance documents are listed due to the state of transition of network accreditation guidance and the fact that networks may be operating under legacy certification and accreditation guidance.Ensure system security requirements are addressed during all phases of DARPA program life cycles (concept development, Request for Information (RFI), Request for Proposal (RFP) or BAA, Proposal, Selection, Award, Closeout, Transition, etc.).Planning, preparing, and executing inspections, authorization and approval (A&A) events IAW with the respective policies detailed in paragraph 3.12.c. for all classifications of networks; to include the development and review of Automated Information System Authorization and Approval Packages.Develop, review, endorse, and recommend action by the authorizing official (AO), delegated authorizing official (DAO), or designated approval authority (DAA) for system certification documentationConduct quality control of system accreditation packages for completeness of accreditation artifacts within 3 business days of receipt from the technology office security staffs or their cleared defense industry contractors and/or participating government agencies.Process authorization and approval or denial documentation to the respective DAPRA AO/DAO/or DAA within 10 business days of receipt of a complete packageConduct security control assessments for the evaluation of security controls to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for an AISProvide an assessment of the severity of weaknesses or deficiencies discovered in the information system and its environment of operation and recommend corrective actions to address identified vulnerabilitiesAnalyze and make recommendations in support of DARPA accredited network Configuration Control Board cases within 10 calendar days of case validation by the respective network?s Information System ownerMonitor activities of DARPA accredited networks and DARPA DAO Accredited performer networksProvide advice, assistance, and analysis of threats and vulnerabilities and risk mitigation and acceptance recommendations, as required. Conduct certification tests that include verification that the features and assurances are functional and support accreditationWork collaboratively with the MSO/Information Technology Directorate (ITD) in the authorization and approval and continuous monitoring of DARPA unclassified and classified networks; including but not limited to:DARPA Management Security System (DMSS) ? UnclassifiedDARPA Public Network (DPN) - UnclassifiedDARPA Secret Network (DSN)/Secret Internet Protocol Router Network (SIPRNet) Connection ? up to SECRET CollateralDARPA Joint Worldwide Intelligence Communications System (JWICS) Network (DJN)/JWICS Connections ? up to TOP SECRET SCIDARPA Secure Wide Area Network (DSWAN) ? up to SECRET CollateralMulti-Level Security System (SAVANNAH) ? up to TOP SECRET SAP and SCIReview and recommend changes or amplification of policy, procedures, and strategy developmentEvaluate Information Assurance (IA) products and provide written recommendations as to their risk and usefulness and/or adoption for the DARPA IA missionEvaluate information technology (IT) vulnerabilities to assess whether additional safeguards are prudent and ensure certification is accomplished for each information systemDevelop and maintain a formal, written Information Systems Security Program SOPEnsure all Information System Security Officers (ISSO), network administrators, and other Automated Information Security (AIS) personnel, to include DARPA performers performing these functions, receive the necessary and required technical and security training to carry out their dutiesEnsure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local AIS security training.Maintain a repository for all system certification/accreditation documentation and modificationsCoordinate AIS security inspections, tests, and reviewsPrepare policies and procedures for responding to security incidents and for investigating and reporting security violations and incidentsEnsure proper protection or corrective measures have been taken when an incident or vulnerability has been discoveredAssess changes in a system, its environment, or operational needs that could affect the accreditationEnsure configuration management (CM) for security-relevant AIS software, hardware, and firmware is maintained and documentedPerform system audits on multiple systems; work closely with system administrators and ensure current security measures are sufficient and in compliance with approved policies and processesPerform, and conduct training as required, for the execution of secure file transfers/trusted downloads between local systems to storage devices, this includes secure down writing of data between systems of different security levelsProvide technical advice and assistance, as required, and perform technical oversight on telecommunications requirements for Collateral, SAP, and SCI systems and networksIn coordination with SID Emergency Management, review and provide AIS security relevant input to DARPA Emergency/Disaster plans and procedures.
Required Skills (Knowledge, Skills, Abilities)Must also have a working knowledge and understanding of the DoD 5205.07 Volume 1 Enclosure 9 ?SAP Compliance Inspections.?Relevant work experience as specified for an Information Assurance Technical (IAT) Level III or Information Assurance Management (IAM) Level II in DoD Manual 8570.1-MExtensive knowledge of RMF (Risk Management Framework)Experience assessing and authorizing various PIT systems (of all classification levels) including but not limited to; space systems, manned and unmanned aircraft systems, manned and unmanned underwater vessels, cyber operation platforms, cyber capabilities, directed energy systems, and hand-held battle field orientation electronic devices
Professional Business FunctionsAttend meetings (either locally or out-of-area) and create meeting summaries or trip reportsPrepare and submit meeting minutes on an as-required basisPrepare/present briefings, incorporating graphics (if appropriate) for/to SID/ DARPA leadersPrepare various security forms associated with their dutiesAssist in entry control and perform escort duties for visitorsAnswer telephones and other modes of administrative communications in the performance of dutiesPerform self-inspections, identify security discrepancies, and report security incidentsPerform, or support, security inspections, identify security discrepancies and prepare reportsPerform courier duties within the continental United States (CONUS)Perform user-level security administrator and information security responsibilities are required and in compliance with US Codes, Executive Orders, and DoD and DARPA policyPerform objective reviews on all documentation encountered during performance of duties
ClearanceMinimum of active Top Secret (TS)TS/SCI strongly desiredSubject to a random counter-intelligence scope polygraphs as a condition of access eligibility.
Years of Experience/Education RequirementsThe Senior Cybersecurity positions require a Bachelor?s degree in Computer Science or Information Systems with at least 12 years of specific, demonstrable, and successful experience fulfilling a Cybersecurity role for a DoD or IC customer on similar size and scale.A Master?s degree in Computer Science or Information Systems may substitute for 4 years of relevant experience.
Travel RequirementsSome travel is required for this position.Ability to travel to CONUS and/or OCONUS locationsMust have active US passport for OCONUS travel requirements
Additional InformationThis job description is not designed to cover or contain all job duties required by the employee. There may be additional activities, duties or responsibilities that are required of the employee that are not listed in this job descriptionThis position requires the candidate to be able to obtain a security clearance. In order to obtain a clearance, In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.System High is proud to employ U.S. Military Veterans. Our extensive work on behalf of the U.S. government offers those who have served in uniform an opportunity to continue to serve their country in a new, exciting way while enjoying a successful civilian career.System High Corporation is an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state or local law. EEO is the Law