PRIMARY RESPONSIBILITIES:
The Cybersecurity Analyst will work in close collaboration with the Information Systems Security Manager (ISSM) and Information Systems Owner (ISO) to ensure security posture is met and maintained, develops security policies, procedures, plans, and all other evidence of compliance with various security controls. Creates and maintains RMF documentation to include Enterprise Mission Assurance Support Service (eMASS) and Information Technology Investment Portfolio Suite (ITIPS) database entries with System Security Plans (SSP), Security Assessment Reports (SAR), Plans of Action & Milestones (POA&M), all other artifacts and documentation tied to the NIST processes. Provide support to maintain a strong cybersecurity posture for the system until its disposal.
- Build, maintain, and track system’s cybersecurity baselines via eMASS or equivalent, IAW cybersecurity policies, guidance, and plans.
- Review, assess, create, and update enclave documentation in eMASS and any Configuration Management (CM) system for the ISSM review and approval such as: Security Plan, Security Assessment Plan, Category selection checklist, control results, and POA&Ms.
- Identify, collect, review, and maintain RMF required artifacts IAW cybersecurity policies, guidance and plans.
- Ensure accurate system documentation and configuration logs are maintained to reflect current and prior configuration baselines.
- Provide written evaluations portraying system progress on RMF compliance IAW cybersecurity guidance (one evaluation for each system per quarter).
- Maintain cybersecurity data for systems registered in the ITIPS IAW FISMA requirements.
- Conduct and/or report annual FISMA security reviews, contingency test completion dates, and validation of cybersecurity control compliance, IAW cybersecurity guidance, the organizational cybersecurity strategy, and POA&M.
- Conduct annual control validations (ACVs) for all NC3 systems IAW AF Global Strike Command (AFGSC)cybersecurity guidance and for all non-NC3 systems in a similar manger, but in accordance with SSC/ECP policies and schedule.
- Create and maintain mission common control packages and serve as the common control provider for each mission system.
- Create and maintain Authority-to-Connect (ATC) guest system packages in eMASS for non-USSF systems connected to SSC/ECP systems.
- Ensure the required cybersecurity functional activities and actions during the systems’ O&S phase are conduction IAW cybersecurity related laws and regulations such as the National Cybersecurity Protection Act, FISMA, OMB A1-30 mandate, and EO 13636 Improving Critical Infrastructure Cybersecurity and Resilience including policies, standards, special publications, instructions and guidance from the DoD, Military, NIST, CNSS, Defense Information System Agency (DISA), and Department of the AF (DAF).
- Participate in the system’s IPTs and sustainment contractor meetings/teleconferences, change control boards (CCBs) and working groups (WGs) to ensure the continued alignment of cybersecurity requirements in the technical baselines, the system security architecture, information flows, design, and security controls.
- Evaluate system’s sources of changes such as Deficiency Reports (DRs), Problem Reports (PRs), Change Requests/Proposals (CRs/CPs), Request For Change (RFC), and AF Form 1067s; determine the security impacts of proposed or actual changes to the system, environment, threats, and vulnerabilities; and if any, update all needed RMF artifacts to reflect the changes/revisions.
- Review and provide inputs to modification packages, program/system documents and support agreement updates, and communications and network infrastructure upgrades to ensure proper cybersecurity configuration modification management and planning support are implemented.
- Review system’s test plans and test results and if necessary, observe system testing for security control implementation IAW cybersecurity policies, guidance, and plan.
- Document all findings. Perform security impact analysis on any system change and appropriately prepare letters of assurance, security impact letters, and risk assessment letters to include exceptions, deviations, or waivers to cybersecurity requirements when applicable.
- Monitor and adhere to the system’s A&A schedule deadlines IAW the Program Office’s Cybersecurity Plan and IPT’s schedule.
- Review annually and provide recommended updates to program cybersecurity policies and plans IAW cybersecurity guidance.
- Review and provide advice on RMF related memorandums of agreements/memorandums of understanding/service level agreements/interconnection service agreements (MOA/MOU/SLA/ISA) for RMF compliance IAW cybersecurity policies, guidance and plans.
- Assist with the cybersecurity vulnerability management plan and risk assessment capability.
- Receive and review ACAS and SCC reports from the sustainment contractor for each system quarterly and characterize risk for each system semi-annually.
SUPERVISORY RESPONSIBILITIES:
This position does not supervise the work of others.
OTHER DUTIES:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and/or activities may change at any time with or without notice.