KEYW Corporation

  • Assessment and Authorization Engineer - Assured Compliance Assessment Solution (ACAS)

    Job Locations 2 months ago(4/17/2018 5:33 PM)
    ID
    2018-17586
    # of Openings
    1
    Posted Date
    Information Assurance
    Default: Location : Location
    US-AZ-Sierra Vista
    Job Locations
    US-AZ-Sierra Vista
  • Overview

    Join our assessment and authorization engineering team.  We are responsible for the implementation of the DoD RMF (Risk Management Framework) that supports development, integration, test, and cyber security of the DCGS-A family of systems and products. The assessment and authorization engineering team identifies, researches, and implements a full documented RMF approach and performs ACAS security scanning within an environment both for physical and virtual infrastructure.  Our goal is to enhance the building, infrastructure, and system security while not impeding performance of the services that support our organization. 

    Qualifications

     

     

     

    Responsibilities 

    As an assessment and authorization engineer, you will be part of a team that provides RMF support to the Software Engineering Center (SEC) Intelligence Support Division (ISD). To include evaluating system security requirements to ensure all infrastructure and development systems can be accredited for processing at appropriate classification levels in compliance with applicable policies, regulations, and guidelines.  Specifically, you will: 

    Plan for accreditation

    • Support and advise on Information Assurance issues/concerns
    • Identify security risk analysis, mitigation, evaluation, and reporting in support of IA A&A processes
    • Develop draft ACAS sustainment support documentation for updating and utilization of current and future architectures, change control, configuration management, and operations procedures
    • Configure ACAS Security Center (ie., build repositories, accounts, credentials, scan zones, etc) based on DISA guidelines

    Define system boundaries

    • Perform assessments to identify active devices on the network by OS
    • Map the network and identify assets and if there is segmentation
    • If possible provide graphic of network design to specified audience as directed (ie, Management and technicians).

    Determine the vulnerabilities

    • Build assets lists of discovered assets and segregate by OS
    • Build custom scan policies when needed using latest DISA/Vendor Benchmarks and DISA STIGs
    • Build scans using custom and latest Army policy
    • Schedule scans

    Report

    • Develop and prepare technical reports and related documentation for Certification and Accreditation (C&A)packages
    • Provides detailed system test and scan reports as well as the Plan of Action and Methods (POA&M) document for all tested systems/networks
    • Build custom report templates specific to audience with degree of granularity specific to audience (Technical/Managerial)
    • Create remediation report specific to audience with degree of granularity specific to audience (Technical/Managerial)

    Remediate

    • Research and analyze DoD and Department of the Army (DA) policies to mitigate implementation problems that may impact the ACAS implementation
    • Coordinate with the IT Infrastructure to implement Security Technical Implementation Guide (STIG) changes that apply to the infrastructure baselines

    About the Organization

    KeyW is a pure-play national security solutions provider for the Intelligence, Cyber and Counterterrorism Communities' toughest challenges. We support the collection, processing, analysis and dissemination of information across the full spectrum of their missions. We employ and challenge more than 2,000 of the most talented professionals in the industry with solving such complex problems as preventing cyber threats, transforming data into intelligence and combating global terrorism.

     

    KeyW, together with its direct and indirect subsidiaries, encourages and actively supports a policy of Equal Employment Opportunity and commits to provide equal opportunity to each individual, regardless of race, color, religion, gender, sexual orientation, age, national origin or ancestry, marital status, veteran status, disability or any other classifications protected by Federal, State or local law. In fact, we foster an environment that promotes diversity, balance and fun—because we believe in the importance of having a workplace as unique as the challenges we solve.

    Clearance

    Minimum Qualifications 

    • A bachelor's degree in Computer Science or other Engineering or Technical Discipline and three (3) years of professional work experience (six (6) years’ total professional experience, appropriate computing environment certification, and IA Workforce System Architecture and Engineer (IASAE) specialty qualified experience in place of a degree) is required.
    • Must be knowledgeable with TCP/IP, information security/authorization profiles, or system administration of Unix or Windows networks/systems
    • Must be knowledgeable with the Security Technical Implementation Guides (STIGs),  and all assessment and authorization policies and directives (i.e., DoDI 8510.01) for RMF
    • Three to five years' experience installing, configuring, administering and operating Tenable Security Center and Nessus Scanner, known as Assured Compliance Assessment Solution (ACAS) in the DoD environment
    • Demonstrated experience with virtualization in a DoD environment
    • Solid understanding of Microsoft, Linux/Solaris operating systems and networking
    • Knowledge and experience in working with Firewalls
    • Knowledge and experience in working with Intrusion Detection and Prevention Systems (IDPS)
    • Familiarity with the DIACAP program
    • Ability to work independently and in a mentorship position
    • Current DoD 8570 IAT level II certification requirements (e.g Security+ce)
    • Active TS-SCI Clearance 

     Preferred Qualifications 

    • Demonstrated skills and expertise in the following technologies: SQL/XSQL Server Administrator (SA), Microsoft O/S and security, Information Assurance (IA), IP Data Networking and Vulnerability Assessment product engineering and design, IP network vulnerability scanner Tier 3 support, REM 3.X / Retina 5.X and greater, ACAS Security Center 4.X / Nessus 5.X or greater and HP Tenable Nessus products.
    • IAT-III with CISA, GCIH, GCED, CASP or CISSP
    • Formal EMASS training
    • FedVTE ACAS certified
    • Firsthand experience with a successful RMF program

     

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share to your network!

    Need help finding the right job?

    We can recommend jobs specifically for you! Click here to get started.