Please scroll down, To apply

Cybersecurity, Journeyman with Security Clearance

hiring now
New job

Torch Technologies Inc.

2024-09-21 02:40:00

Job location Dayton, Ohio, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

Torch Technologies is currently seeking a Cybersecurity Engineer (Journeyman) located within Kettering, OH (Dayton/WPAFB area) to join a team supporting two programs on our EPASS GB contract. As part of the AFLCMC/GB Business and Enterprise Systems Directorate (BES); the Command Management System (CMS) uses a two-tier architecture that consists of the following components: Oracle database server and a Production Application Server. The Department of Defense prescribes a standard Planning, Programming, Budgeting, and Execution process (PPBE). AFMC operates five (5) centers nationwide. The PPBE activities supporting the AFMC operation are complex and require the gathering of budget requirements and allocation of approved funds. This data is refined through the Agile Combat Support Core Function Lead Integrator (ACS CFLI) Program Objective Memorandum (POM). The AFMC uses CMS as a tool to increase the productivity of the personnel assigned to prepare accurate POM requirements and submissions. The system has a user base of over 1,300 geographically separated program analysts. The Keystone Decision Support System (KDSS) facilitates financial decision making within the Air Force (AF) Working Capital Fund (WCF), to include budget submission. This fund supports the buying and selling of parts in support of aircraft repair throughout the world. AFMC, Air Staff, the Air Force Sustainment Center (AFSC) and Air Logistics Complexes (ALCs), along with other major commands, have a requirement to analyze financial, logistical, and budgetary information relative to the analyze these financial and operational performance indicators. Furthermore, KDSS provides multidimensional analysis and ad hoc reporting capabilities to support the evolving business environment of the AFWCF. Accessed through the Air Force Portal, KDSS is a four-tier architecture with an internetaccessible (Web browser), web server, On-Line Analytical Processing (OLAP) application server, and Oracle database server. The KDSS refreshes its database on a daily/weekly/monthly basis from multiple transaction systems (both financial and logistics). KDSS receives data feeds via Secure File Transfer (SFTP) / File Transfer Protocol (FTP), which are then transformed and aggregated. KDSS performs data transformation during the data load process. The OLAP tool provides the capability for multi-dimensional analysis and reporting. The incorporation of the AFWCF Budget Development Tool (BDT) into Keystone provides the ability to assist budget analysts in successfully and accurately creating the AFWCF Program and Budget Review (PBR) and President's Budget (PB) Justification Book (J-Book) exhibits and narratives. ESSENTIAL DUTIES/POSITION DESCRIPTION: This position requires a highly motivated individual with experience. The successful candidate will provide the PMO/Capability Development Manager (CDM) cybersecurity support per DoDI 8500.01. Support includes assessing and continuously monitoring cybersecurity risk ensuring that legacy and new capabilities adhere to enterprise standards such as Risk Management Framework (RMF), Cybersecurity Framework (CSF), and National Institute of Standards and Technology (NIST) and per Authorization Official's Information System's Continuous Monitoring (ISCM) strategy. This position will be responsible for ensuring the appropriate operational security posture is maintained for the assigned IT. This includes the following related to maintaining situational awareness and initiating actions to improve or restore cybersecurity posture: • Implements and enforce all AF cybersecurity policies, procedures, and countermeasures. • Completes and maintains required cybersecurity certification IAW AFMAN 17-1303. • Ensures all users have the requisite security clearances and need-to-know, complete annual cybersecurity training, and are aware of their responsibilities before being granted access to the IT according to AFMAN 17-1301. • Maintains all authorized user access control documentation IAW the applicable AF Records Information Management System. • Ensures software, hardware, and firmware complies with appropriate security configuration guidelines, e.g., security technical implementation guides/security requirement guides. • Ensures proper configuration management procedures are followed prior to implementation and contingent upon necessary approval. • Coordinate changes or modifications with the system-level ISSM, SCA, and/or the Wing Cybersecurity office. • Initiates protective or corrective measures, in coordination with the ISSM, when a security incident or vulnerability is discovered. • Reports security incidents or vulnerabilities to the system-level ISSM and wing cybersecurity office according to AFI 17-203, Cyber Incident Handling; and, Initiates exceptions, deviations, or waivers to cybersecurity requirements. Job Requirements The successful candidate has the knowledge, experience and demonstrated ability to perform tasks related to the technical/professional discipline they are performing. Typically works independently and applies the proper procedures and processes related to their area of expertise. Has the ability to problem solve and troubleshoot various situations to develop successful outcomes within established program/project guidelines. Work is performed independently or under the oversight of more senior contractor employees (Program Office and Staff Level Support interface). All Cybersecurity professionals should possess experience providing guidance on the following to include, but not limited to: • Access control. • Configuration management. • System and communications protection. • Contingency planning. • Incident handling. • System and information integrity. • Security and privacy training and awareness; and, • Software development activities, software and tools related to Cybersecurity. Experience performing cybersecurity duties as outlined in DoDI 8500.01, AFI 17-130, and AFI 17-1301 for assigned AF IT. Experience validating, evaluating and analyzing finding results and developer adjudications using automated testing tools, e.g., Fortify, Checkmarx, SonarQube, and AppScan. Experience utilizing DoD tracking systems to input/document cybersecurity deficiencies, vulnerabilities, and change requests in the appropriate tracking system for each program, e.g., Jira, HP ALM, and eMASS. Experience with conducting information security continuous monitoring (ISCM) by maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions IAW approved ISCM strategy. EDUCATION: Bachelor's or Master's Degree in a related field and at least three years of experience in the respective technical/professional discipline being performed, three of which must be in the DoD OR, seven years of directly related experience with proper certifications, five of which must be in the DoD. CERTIFICATION REQUIREMENTS: At a minimum, the successful candidate will meet the requirements for and maintain a DoD 8570.01 IAT Level II Cybersecurity certification by possessing one of the following certifications: • Cisco CCNA Security • CompTIA CSA+/CySA+ • GIAC GICSP • CompTIA Security+ CE • (ISC)2 SSCP • GIAC GSEC • EC-Council CND U.S. Citizenship Required for this Position: Yes Job Type: Regular Full-time Security Clearance: Secret Schedule: 40 Hrs/week Work Location: Kettering, OH Travel: 0-10% Relocation Assistance Available: No Position Contingent Upon Award of Contract: No Benefits: Torch Technologies is proud to offer a stable and professional work environment, a competitive salary, and an excellent, comprehensive benefit package including: ESOP participation, 401(k) match and safe-harbor contribution, medical, dental, vision, life insurance, short-term disability, long-term disability, flexible spending accounts, Health Saving Accounts and Health Reimbursement Accounts, EAP, education assistance, paid time off, and holidays. Applying to Torch Technologies: Only those candidates invited for an interview will be contacted. Employment at Torch Technologies is contingent upon the successful completion of a comprehensive background check. Torch Technologies is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Employment Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability or any other protected class. If you are a qualified individual with a disability or a disabled veteran, you have the right to request a reasonable accommodation if you are unable or limited in your ability to use or access as a result of your disability. You can request reasonable accommodations by sending an email to . Thank you for your interest in Torch Technologies.

Inform a friend!

<!– job description page –>
Top