Huntington Ingalls Industries Information Assurance Systems Engineer Level 2 - 18867 in Wright Patterson AFB, Ohio
Information Assurance Systems Engineer Level 2 - 18867
Position Location Wright Patterson AFB, OH
Requisition # 18867
# of Openings 1
HII-Mission Driven Innovative Solutions Inc. (HII-MIS) is currently seeking an Information Assurance Systems Engineer Level 2 to work at Wright-Patterson AFB, OH.
Personnel filling this position execute Cybersecurity, Risk Management Framework (RMF), Assured Compliance Assessment Solution (ACAS), Enterprise Mission Assurance Support Service (eMASS), and other Information Assurance (IA) functions required to support over 48 Aircraft Training Systems (ATSs) and Maintenance Training Systems (MTSs) at over 184 locations worldwide for the Simulators Division, Air Force Lifecycle Management Center (AFLCMC/WNS).
Duties and Responsibilities (to include but not be limited to the following) :
Take direction from the RFS 5 Lead and keep the Lead informed of all activities and workload.
Support the Live, Virtual, and Constructive Operational Training (LVC-OT) cybersecurity strategy. Conduct and review cybersecurity operations to include all RMF steps, activities, and tasks to perform Assess and Authorize (A&A) and Assess-Only processes in support of simulator ATSs, MTSs, systems, networks, and ranges. Perform in one or more of the following roles: Information System Security Manager (ISSM), Information System Security Officer (ISSO), Information Security System Engineer (ISSE), and/or cybersecurity Subject Matter Expert (SME).
Support the Information System Owner (ISO). Produce, maintain, track, and upload RMF documents and artifacts into the Enterprise Mission Assurance Support Service (eMASS). Support RMF IAW the RMF Knowledge Service (KS) to ensure Information Assurance (IA) and Computer Security is incorporated throughout the simulator’s architecture system development life cycle (SDLC) at all classifications. Document security controls in all security control families in eMASS. Ensure non-compliant and non-applicable controls are updated according to the Authorization To Operate (ATO). Create and generate RMF documents and artifacts: e.g., Information Technology Categorization and Determination (ITCD), System Security Plan (SSP), Plans of Action and Milestones (POA&M). Determine if system artifacts are complete and accurate.
Support Information Owners (IOs). Achieve consistent application and implementation of security policies, countermeasures, and procedures under development and fielded at user sites. Standardize non-technical assessment policies and procedures.
Support a simulator programs' ISSMs, ISSOs, and ISSEs. Provide cybersecurity expertise and services. Verify ISSOs are appointed in writing and verify they follow cybersecurity policies and procedures. Develop and maintain organizational and program cybersecurity architecture, requirements, objectives and policies, and cybersecurity processes and procedures. Manage and update RMF cybersecurity information to include verifying artifacts are entered in eMASS.
Support Security Control Assessor (SCA), SCA Representative (SCAR), and/or Associate Security Control Assessor Representative (ASCAR). Provide technical expertise and cybersecurity services to augment and functions throughout all security development lifecycles performed within a simulator program's SDLC. Develop and implement Common Control Provider security controls and an eMASS program of record. Develop and distribute Best Practices and Lessons-Learned to the entire simulator fleet.
Increase the security posture of programs. Ensure security controls are implemented and working per the ATO. Recommend risk mitigation procedures and countermeasures when a cybersecurity incident or vulnerability is discovered. Ensure a process is in place for users to report all cybersecurity threats, vulnerabilities, and incidents, whether actual or suspected, are reported to authorities (e.g., ISSO, ISSM, PM). Assess the accuracy and completeness of RMF authorization packages IAW the Package Approval Chain (PAC) in eMASS. Reduce the Control Approval Chain (CAC) security control rejection and rework. Provide a centralized management approach to create, update, track, and monitor POA&Ms through resolution of security findings.
Conduct fully-credentialed vulnerability and compliance scans using the automated tools (e.g., ACAS, Security Content Automation Protocol (SCAP) Security Checker (SCC), HBSS). Implement, configure, operate, and generate reports using the tools. Perform vulnerability and compliance testing of simulator system security features, and witness processes related to each IA/security control. Verify compliance with DISA Security Technical Implementation Guides (STIG), audit files, and DISA STIG SCAP Benchmarks. Conduct regression scans and provide results to ISSMs, ISO, SCAR, SCA, and Authorizing Official (AO). Provide and coordinate classified transport of tools to operationalize on-site simulator scan operations. Recommend patches, hot fixes, and countermeasures to mitigate high and critical findings.
Support the Tier 3, depot-level sustainment and maintenance activity for SENTRI scan solutions. Create, maintain, and publish scanner installation and configuration guides and scanner user's guides.
Provide Simulator Common Architecture, Requirements, and Standards (SCARS) cybersecurity support.
Travel to simulator program sites. Provide cybersecurity support and services to site personnel. Promote and improve simulator security postures and compliance with cybersecurity policies. Assess current cybersecurity operations. Conduct analysis of findings on unclassified and classified networks and systems. Document simulator security postures to ensure a robust cybersecurity program that complies with National, Federal, Department of Defense, and Air Force policies and procedures.
Develop and provide IA, Cybersecurity, RMF, and SENTRI/ACAS training courses and instructions. Analyze, develop, and execute training for government and contractor support personnel. Increase personnel security awareness of evolving threats, policies and procedures. Streamline processes and procedures.
Qualifications and Experience:
DoD IAM-Level II (CAP, CASP, CISM, CISSP or associate, GSLC)
3 years of engineering experience in system design and architecture development with modern computer platforms (e.g., OS, cloud computing, datacenter operations).
A strong working knowledge of RMF, ACAS, and eMASS.
Experience in applying information systems security principles, concepts, and methods for RMF, eMASS, and ACAS toolsets and project management principles across IT disciplines and DoD information systems
Defense Information Assurance Certification and Accreditation Process (DIACAP) proficiency.
eMASS and ACAS training and familiarity.
Secret Security Clearance.
Be eligible for a Top Secret (TS)/Single Scope Background Investigation (SSBI) clearance with Sensitive Compartmentalized Information (SCI) access.
All candidates will be subject to a pre-employment background investigation and drug screening per HII requirements.
The selected applicants will be subject to a security investigation and must meet eligibility requirements for access to classified information.
Huntington Ingalls Industries is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or any other protected class.