KBR's National Security Solutions team provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security communities. In this position, your work will have a profound impact on the country’s most critical role – protecting our national security.
Requirements
- Bachelor’s degree in computer, information systems management or related field from an accredited college or university or equivalent experience.
- 4 years’ experience as an ISSO is required.
- Experience with DOD 8500.01, Risk Management Framework (RMF) requirements as well as experience in drafting, submitting, and maintaining RMF packages.
- Experience in development and maintaining of RMF Documents including System Security Plans (SSP), System Security Checklists, Privacy Impact Assessments, and Authority to Operate (ATO) artifacts.
- Experience in developing Plan of Action and Milestones (POA&M)
- Knowledge of independent verification and validation techniques is required.
- Experience working independently and as part of a team in researching data, developing analytical techniques and methodologies is required.
- A current Information Assurance Manager (IAM) Level I (CAP, Security+ CE) or comparable certification in accordance with DoD 8570.01-M.
- 3 years’ experience Implementing and monitoring cybersecurity controls (e.g., NIST SP 800-53) and maintains the Risk Management Framework (RMF) package for authorized systems.
- 3 years’ experience Developing, updating, and reviewing system security documentation, including the System Security Plan (SSP), Plan of Action and Milestones (POA&M), and Contingency Plans. Disseminates information and ensures computer security practices are adhered to by all functional areas.
- 3 years’ experience Performing continuous monitoring of systems, audits security logs, analyzes anomalies, and reports findings to the ISSM.
- 3 years’ experience Supporting incident handling and response procedures to prevent unauthorized access or data breaches.
- 3 years’ experience Evaluating and tracking security impacts of hardware and software changes. Accomplishes risk analysis, security testing, and certification due to modifications or changes to computer systems. Evaluates, assesses, or locally tests and approves all hardware, software, and firmware products that provide security features prior to use on any accredited information system or network.
- Active Top Secret clearance with SCI and SAP eligibility
Benefits
- 401K plan with company match
- Medical
- Dental
- Vision
- Life insurance
- AD&D
- Flexible spending account
- Disability
- Paid time off
- Flexible work schedule