What are the responsibilities and job description for the Cybersecurity Analyst position at BTAS?
Job Title: Cybersecurity Analyst
Security Clearance Required: Secret (TS/SCI Preferred)
Work Location: Peterson AFB, Colorado Springs, CO
Position Type / Standard Work Hours: Full-time/40 hours per week
Work Location: Peterson AFB, Colorado Springs, CO
Position Type / Standard Work Hours: Full-time/40 hours per week
Summary / Objective:
This is an exciting opportunity to support the United States Space Force (USSF) Military Satellite Communications (MILSATCOM) program. The Space Systems Command (SSC) has the collective USSF mission responsibility for the development, deployment, maintenance, and sustainment of space systems providing early missile warning capability; environmental sensing; precision navigation, guidance, and timing; nuclear event detection; space launch capability; national and military satellite communications capabilities; launch range and network systems; advanced systems; and technology development programs.
This position will work in close collaboration with the Information Systems Security Manager (ISSM) and Information Systems Owner (ISO) to ensure security posture is met and maintained, develops security policies, procedures, plans, and all other evidence of compliance with various security controls. Creates and maintains RMF documentation to include Enterprise Mission Assurance Support Service (eMASS) and Information Technology Investment Portfolio Suite (ITIPS) database entries with System Security Plans (SSP), Security Assessment Reports (SAR), Plans of Action & Milestones (POA&M), all other artifacts and documentation tied to the NIST processes. Provide support to maintain a strong cybersecurity posture for the system until its disposal.
Primary Responsibilities:
- Build, maintain, and track system’s cybersecurity baselines via eMASS or equivalent, IAW cybersecurity policies, guidance, and plans.
- Review, assess, create, and update enclave documentation in eMASS and any Configuration Management (CM) system for the ISSM review and approval such as: Security Plan, Security Assessment Plan, Category selection checklist, control results, and POA&Ms.
- Identify, collect, review, and maintain RMF required artifacts IAW cybersecurity policies, guidance and plans.
- Ensure accurate system documentation and configuration logs are maintained to reflect current and prior configuration baselines.
- Provide written evaluations portraying system progress on RMF compliance IAW cybersecurity guidance (one evaluation for each system per quarter).
- Maintain cybersecurity data for systems registered in the ITIPS IAW FISMA requirements.
- Conduct and/or report annual FISMA security reviews, contingency test completion dates, and validation of cybersecurity control compliance, IAW cybersecurity guidance, the organizational cybersecurity strategy, and POA&M.
- Conduct annual control validations (ACVs) for all NC3 systems IAW AF Global Strike Command (AFGSC) cybersecurity guidance and for all non-NC3 systems in a similar manner, but in accordance with SSC/ECP policies and schedule.
- Create and maintain mission common control packages and serve as the common control provider for each mission systems.
- Create and maintain Authority-to-Connect (ATC) guest system packages in eMASS for non-USSF systems connected to SSC/ECP systems.
- Ensure the required Cybersecurity functional activities and actions during the systems’ O&S phase are conducted IAW Cybersecurity related laws and regulations such as the National Cybersecurity Protection Act, FISMA, OMB A1-30 mandate, and EO 13636 Improving Critical Infrastructure Cybersecurity and Resilience including policies, standards, special publications, instructions and guidance from the DoD, Military, NIST, CNSS, Defense Information Systems Agency (DISA), and Department of the AF (DAF).
- Participate in the system’s IPTs and sustainment contractor meetings/teleconferences, change control boards (CCBs) and working groups (WGs) to ensure the continued alignment of cybersecurity requirements in the technical baselines, the system security architecture, information flows, design, and the security controls.
- Evaluate system’s sources of changes such as Deficiency Reports (DRs), Problem Reports (PRs), Change Requests/Proposals (CRs/CPs), Request For Change (RFC), and AF Form 1067s; determine the security impacts of proposed or actual changes to the system, environment, threats, and vulnerabilities; and if any, update all needed RMF artifacts to reflect the changes/revisions.
- Review and provide inputs to modification packages, program/system documents and support agreements updates, and communications and network infrastructure upgrades to ensure proper cybersecurity configuration modification management and planning support are implemented.
- Review system’s test plans and test results and if necessary, observe system testing for security control implementation IAW cybersecurity policies, guidance and plan.
- Document all findings. Perform security impact analysis on any system change and appropriately prepare letters of assurance, security impact letters, and risk assessment letters to include exceptions, deviations, or waivers to cybersecurity requirements when applicable.
- Monitor and adhere to the system’s A&A schedule deadlines IAW the Program Office’s Cybersecurity Plan and IPT’s schedule.
- Review annually and provide recommended updates to program cybersecurity policies and plans IAW cybersecurity guidance.
- Review and provide advice on RMF related memorandums of agreements/ memorandums of understanding/ service level agreements/ interconnection service agreements (MOA/MOU/SLA/ISA) for RMF compliance IAW cybersecurity policies, guidance and plans.
- Assist with the cybersecurity vulnerability management plan and risk assessment capability.
- Receive and review ACAS and SCC reports from the sustainment contractor for each system quarterly and characterize risk for each system semi-annually.
Required Qualifications:
- Experience with DoD RMF functions and Processes and/or DISA IASE
- IAT or IAM Level 2 Certification per DoD 8570.01M
- Active DoD Secret Clearance
- High School diploma with 6 years of experience including 2 years of experience in performing IAT level II or IAM level II functions.
- (An Associates degree can be substituted for 2 years of experience and a bachelor’s degree may be substituted for 6 years of experience.)
Preferred Qualifications:
- Experience with Xacta
- Experience with FISMA, eMASS and/or ITIPS
- Bachelor’s degree
- Top Secret/SCI Clearance
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and/or activities may change at any time with or without notice.
Salary: Competitive benefit package and salary commensurate with experience: range $80,000 – $90,000 USD.
AAP / EEO Statement:
BTAS is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity or sexual orientation, national origin, age, marital status, genetic information, disability, protected veteran status, or any other characteristic protected by law.
BTAS is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender identity or sexual orientation, national origin, age, marital status, genetic information, disability, protected veteran status, or any other characteristic protected by law.
BTAS is an E-Verify program participant.
Salary : $80,000 - $90,000