• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

Remote Work Cyber security Architect

remote opportunity cybersecurity risk management framework RMF job

January 27, 2020 by Leave a Comment

check out the Cyber Security & IT Resume course:
https://securitycompliance.thinkific.com/courses/resume-marketing-for-cyber-security-it
Coupon code: resumefeb2020
50% off (expires 29 Feb 2020)

check out the remote work course:
https://securitycompliance.thinkific.com/courses/find-it-remote-work

Check out the job:
Job Title: Cybersecurity Risk Management Framework SME
Location: #RemoteJob (#WorkfromHome)
Duration: 12 Months (Contract-to-Hire)
Job Description:
Active Secret Clearance Required

· KBRwyle is seeking candidates with Risk Management Framework (#RMF) experience to join a team of experienced RMF professionals that supports the Defense Health Agency (DHA).

Position Description:

· Primary responsibility is to perform tasks related to Assessment & Authorization (A&A) and cybersecurity under the Defense Health Agency (DHA) to obtain and maintain Authorizations to Operate (ATOs) for assigned DoD medical systems (i.e., applications, networks, devices). This position will be a part of a team developing recommended courses of action needed to transition current policies and procedures to the DHA RMF-approved processes.

Primary Responsibilities:

· Provide solutions to complex problems that require the regular use of expertise and creativity. Problems are broadly defined and solutions require the continuation of specialized theories and knowledge

· Serve as Subject Matter Expert (SME) on one or more technologies/skills related to A&A activities

· Conduct risk and vulnerability assessments of information systems to identify vulnerabilities, risks, and protection needs

· Actively participate in working group meetings to identify, plan, and execute strategies in response to emerging cybersecurity/RMF policies

· Attend and participate in regular A&A status meetings to facilitate progress and address potential issues of RMF system efforts

· Maintain awareness and knowledge of evolving security and risk management standards and communicate and apply relevant changes to existing processes

Day-to-day tasks are contingent on related experience and assigned role, and may include the following:

· Develop, update, and/or review RMF documentation to include Security Plans, Implementation Plans, Plans of Action and Milestones (POA&Ms), and Risk Assessment Reports

· Assess system compliance against NIST, DoD, and DHA security requirements to include the NIST 800-53 controls and DISA Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs)

· Produce evidence as necessary to support compliance status of NIST, DoD, and DHA security requirements

· Work with system administrators, engineers, and developers to create or update system/site policies, procedures, and process guides

Minimum Qualifications:

· BS degree and six (6) years of experience with Cybersecurity / Information Technology, or twelve (12) years of hands-on experience with Cybersecurity / Information Technology

· Demonstrated efficiency and experience in one or more of the following areas:

· RMF package development, including POA&Ms (mitigation statements), Security Plans, Risk Assessments, system/site policies, procedures, and processes, architecture diagrams, and hardware and software inventories

· Assured Compliance Assessment Solution (ACAS) and Host Based Security System (HBSS)

· DISA STIGs/SRGs validation

· NIST 800-53 control validation

· Continuous Monitoring and Risk Scoring (CMRS)

· RMF policy development and strategy implementation

· BIOMED experience (former technician, physician, engineer, etc.) installing, testing, using, maintaining, designing, and/or modifying medical equipment and applications

· Demonstrated experience with Risk Management Framework (experience under DHA a plus)

· Excellent customer service and organization skills

· Excellent oral and written communication skills

· Familiarity with NIST publications

· Active DoD Secret security clearance

· DoD 8570-compliant (CompTIA Security+ certified)

· Ability to obtain OS certification or complete approved related training within 180 days of hire

· Ability to travel up to 25-35%

· Experience with eMASS

360 Mt. Kemble Avenue, Suite 2000 | Morristown, NJ 07960
Office: 973.507.7582 | Fax: 973.998.2599
siddartha.s@artech.com | www.artech.com

Filed Under: cyberspace workforce, IT Security Jobs, Risk Management For DoD IT, telework jobs Tagged With: cybersecurity risk management job, Remote Work Cyber security Architect, risk management framework, rmf, telework

Remote Work Cyber security Architect

October 22, 2018 by Leave a Comment

For more on cybersecurity:
http://securitycompliance.thinkific.com

CyberSecurity Architect (remote work)
I would really appreciate if you can give me a call back at my contact # 302-401-6677 Ext- 330.

Job Title Remote position-Information Security Architect
Location Philadelphia PA
Duration 6 months /Contract

JOB DESCRIPTION

Interview Mode-Phone and Skype
Needs USC or GC Only

This role will be able to work remotely but the idea is someone in the Philadelphia area to be able to come in once/week.
If they are further away, it would be less than that.
The manager is open to remote candidates but they need to be in the Eastern Standard Time Zone.

Description:

[Information Security Architect]

Brief description of the role

• Collaborate with Security Architecture and Information Security leadership to help guide the Security Architecture Program
• Collaborate with and influence technology leaders and stakeholders to produce solutions and architectures

Key deliverables but not limited to:

• Interpret Information Security requirements, Policies, and Standards to help ensure delivery of secure IT solutions
• Identify and deliver strategic initiatives that drive revenue and improve efficiency, aligned with business strategy
• Develop technology visions and strategies that support and enhance the business strategy
• Cultivate relationships with business stakeholders and IT leadership
• Communicate architectural plans and strategies
• Develop, communicate, and deploy Enterprise Architecture processes, reference architectures, and technical standards/strategies
• Recommend and arbitrate between technical choices that best serve the enterprise needs and adhere to IT’s guiding principles
• Advocate and practice enterprise architecture as well as security solution architecture best practices
• Develop solutions for the enterprise and business application IT segments
• Create and maintain technology standards, strategies, and roadmaps for the enterprise
• Research and recommend current and future technologies by tracking trends and industry best practice
• Maintain in-depth knowledge of the organizations technologies and architectures
• Contribute to the enterprise technology roadmap
• Evaluate and assess new technologies

Key relationships

• Security Architecture Leadership
• Information Security Leadership team
• Information Technology Leadership and team
• Business technical team

High level skills:

• Change and Adaptability
• Client Focus
• Business Acumen
• Results Focus
• Broad knowledge of Information Security, IT and industry best practices
• 10 + years or equivalent experience
• Excellent written communication and presentation skills

High level technical skills

• Network Security
• Network Hardware Configuration
• Network Protocols
• Networking Standards
• Supervision
• Conceptual Skills
• Decision Making
• Informing Others
• Functional and Technical Skills
• Dependability
• Information Security Policies and Standards

Key Requirements
• Acquire a complete understanding of a company’s technology and information systems
• Plan, research and design robust security architectures for any IT project
• Full understanding of a vulnerability testing, risk analyses and security assessments
• Research security standards, security systems and authentication protocols
• Develop requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related network devices
• Full understanding of public key infrastructures (PKIs), including but not limited to use of certification authorities (CAs) and digital signatures (key management is a must)
• Prepare cost estimates and identify integration issues
• Review and approve installation of firewall, VPN, routers, IDS scanning technologies and servers
• Review final security structures to ensure they behave as expected
• Provide technical supervision for (and guidance to) a security team
• Define, implement and maintain corporate security policies and procedures
• Assist when required to security-related incidents and provide a thorough post-event analysis
• Recommend on update and upgrade security systems as needed
• Understanding of the Cloud security, predominantly Microsoft Azure cloud and Oracle cloud, special security needs for cloud systems

Qualifications:

• CISSP (required)
• CISSP-ISSAP (preferred)
• CEH (optional)
• CISA/CISM (optional)

The 3 main components to this role are:
1) Networking knowledge
2) Security knowledge
3) Writing/Communication

Note: Travel is not required, but could be an option.

Filed Under: cyberspace workforce, Information Assurance, Information Assurance Jobs, information system compliance, IT Security Jobs, risk jobs, Risk Management For DoD IT, security compliance, STIGS Tagged With: IT, IT work, Remote Work, Remote Work Cyber security Architect

Primary Sidebar

search


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • Cybersecurity Jobs Resume Marketing: Book 1 Find Cybersecurity jobs
  • Security Control Assessor (SCA) Methods table top exercise
  • Cybersecurity Pro opinion about Tiktok
  • Las Vegas teleworking
  • STIGS in the RMF Process

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce HBSS IA implement implementation info assurance information assurance information security ISSO it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows


This is a breakdown of each of the NIST 800-53 security control families and how they relate to each step in the NIST 800-37 risk management framework process.

also available on Amazon!

View Book

Copyright © 2023 · Author Pro on Genesis Framework · WordPress · Log in