Cybersecurity Analyst at BTAS
Colorado Springs, Colorado, USA -
Full Time


Start Date

Immediate

Expiry Date

28 Nov, 25

Salary

90000.0

Posted On

28 Aug, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Good communication skills

Industry

Information Technology/IT

Description

POSITION: Cybersecurity Analyst
LOCATION: Colorado Springs, CO, Peterson SFB
REQUIRED SECURITY CLEARANCE: Active Secret (TS/SCI Preferred)
POSITION TYPE/STANDARD WORK HOURS: Full time, 40 hours

WHO WE ARE:

BTAS is a woman-owned small business founded in 1995, located near Wright-Patterson Air Force Base in Beavercreek, OH. We have earned national and regional awards in the Department of Defense for our proven IT, Engineering, and Program Management capabilities.
We are committed to working with exceptional quality and professionalism to deliver excellence to our customers, while providing our employees with a stimulating and satisfying work environment as we collaborate with teammates to achieve common goals.

MINIMUM QUALIFICATIONS:

  • High school diploma with 6+ years of experience including 2+ years of experience in performing IAT level II or IAM level II functions.
  • Associates degree can be substituted for 2 years of experience, and a bachelor’s degree may be substituted for 6 years of experience.
  • IAT or IAM Level II Certification per DoD 8570.01M
  • Experience with DoD RMF functions and processes and / or DISA IASE

PREFERRED QUALIFICATIONS:

  • Bachelor’s degree
  • Experience with Xacta
  • Experience with FISMA, eMASS and / or ITIPS
Responsibilities

PRIMARY RESPONSIBILITIES:

The Cybersecurity Analyst will work in close collaboration with the Information Systems Security Manager (ISSM) and Information Systems Owner (ISO) to ensure security posture is met and maintained, develops security policies, procedures, plans, and all other evidence of compliance with various security controls. Creates and maintains RMF documentation to include Enterprise Mission Assurance Support Service (eMASS) and Information Technology Investment Portfolio Suite (ITIPS) database entries with System Security Plans (SSP), Security Assessment Reports (SAR), Plans of Action & Milestones (POA&M), all other artifacts and documentation tied to the NIST processes. Provide support to maintain a strong cybersecurity posture for the system until its disposal.

  • Build, maintain, and track system’s cybersecurity baselines via eMASS or equivalent, IAW cybersecurity policies, guidance, and plans.
  • Review, assess, create, and update enclave documentation in eMASS and any Configuration Management (CM) system for the ISSM review and approval such as: Security Plan, Security Assessment Plan, Category selection checklist, control results, and POA&Ms.
  • Identify, collect, review, and maintain RMF required artifacts IAW cybersecurity policies, guidance and plans.
  • Ensure accurate system documentation and configuration logs are maintained to reflect current and prior configuration baselines.
  • Provide written evaluations portraying system progress on RMF compliance IAW cybersecurity guidance (one evaluation for each system per quarter).
  • Maintain cybersecurity data for systems registered in the ITIPS IAW FISMA requirements.
  • Conduct and/or report annual FISMA security reviews, contingency test completion dates, and validation of cybersecurity control compliance, IAW cybersecurity guidance, the organizational cybersecurity strategy, and POA&M.
  • Conduct annual control validations (ACVs) for all NC3 systems IAW AF Global Strike Command (AFGSC)cybersecurity guidance and for all non-NC3 systems in a similar manger, but in accordance with SSC/ECP policies and schedule.
  • Create and maintain mission common control packages and serve as the common control provider for each mission system.
  • Create and maintain Authority-to-Connect (ATC) guest system packages in eMASS for non-USSF systems connected to SSC/ECP systems.
  • Ensure the required cybersecurity functional activities and actions during the systems’ O&S phase are conduction IAW cybersecurity related laws and regulations such as the National Cybersecurity Protection Act, FISMA, OMB A1-30 mandate, and EO 13636 Improving Critical Infrastructure Cybersecurity and Resilience including policies, standards, special publications, instructions and guidance from the DoD, Military, NIST, CNSS, Defense Information System Agency (DISA), and Department of the AF (DAF).
  • Participate in the system’s IPTs and sustainment contractor meetings/teleconferences, change control boards (CCBs) and working groups (WGs) to ensure the continued alignment of cybersecurity requirements in the technical baselines, the system security architecture, information flows, design, and security controls.
  • Evaluate system’s sources of changes such as Deficiency Reports (DRs), Problem Reports (PRs), Change Requests/Proposals (CRs/CPs), Request For Change (RFC), and AF Form 1067s; determine the security impacts of proposed or actual changes to the system, environment, threats, and vulnerabilities; and if any, update all needed RMF artifacts to reflect the changes/revisions.
  • Review and provide inputs to modification packages, program/system documents and support agreement updates, and communications and network infrastructure upgrades to ensure proper cybersecurity configuration modification management and planning support are implemented.
  • Review system’s test plans and test results and if necessary, observe system testing for security control implementation IAW cybersecurity policies, guidance, and plan.
  • Document all findings. Perform security impact analysis on any system change and appropriately prepare letters of assurance, security impact letters, and risk assessment letters to include exceptions, deviations, or waivers to cybersecurity requirements when applicable.
  • Monitor and adhere to the system’s A&A schedule deadlines IAW the Program Office’s Cybersecurity Plan and IPT’s schedule.
  • Review annually and provide recommended updates to program cybersecurity policies and plans IAW cybersecurity guidance.
  • Review and provide advice on RMF related memorandums of agreements/memorandums of understanding/service level agreements/interconnection service agreements (MOA/MOU/SLA/ISA) for RMF compliance IAW cybersecurity policies, guidance and plans.
  • Assist with the cybersecurity vulnerability management plan and risk assessment capability.
  • Receive and review ACAS and SCC reports from the sustainment contractor for each system quarterly and characterize risk for each system semi-annually.

SUPERVISORY RESPONSIBILITIES:

This position does not supervise the work of others.

OTHER DUTIES:

Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and/or activities may change at any time with or without notice.

Loading...