Thank you for your interest in Torch Technologies. We're an
award-winning, 100% employee-owned company based in Huntsville, Alabama.
Recognized as a top 100 defense company, we're dedicated to supporting
our nation's military. Our guiding principle, "Lighting the Pathway of
Freedom," reflects our commitment to excellence, cooperation,
integrity, and reliability. As a Certified Evergreen ESOP, our dedication
is to continuously develop and maintain our company's success for the next
century, securing a prosperous future for our employee-owners for
generations to come. Join Torch and be a part of shaping the future!
Job Title
Senior Cybersecurity Engineer
Location
Utah - Hill Air Force Base - Hill Airforce Base, UT 84056 US (Primary)
Job Description
Torch Technologies has an exciting opportunity for aSenior Cybersecurity
Engineerto support the Aerospace Dominance Enabler Division
(AFLCMC/HBZ)at Hill AFB in OgdenUtah. HBZ functions as the Air Force's
technical, acquisition and sustainment experts providing unique and
comprehensive support to the warfighter. The ADE Division is responsible for a
vast array of USAF systems to include Electronic Warfare, Range Systems,
Range Instrumentation, Air Combat Training and Aircrew Readiness, Command
and Control Systems, Advanced Radar Threat Systems, Combat Survivor Evader
Locator, P5 Combat Training Systems, Black Switch and Legacy Voice
Systems. Furthermore, the ADE Division provides support to depot level
sustainment and maintenance efforts, FMS, U.S. Army, Navy, Pacific Air
Forces, Air Combat Command (ACC), Air Force Materiel Command
(AFMC), and Air Education and Training Command (AETC) on a continuous basis.
This position requires a highly motivated individual with experience in
cybersecurity to include the below essential duties:
Assist with development of System Security Management Plans, Program
Protection Plans, Security Risk Analyses, OPSEC Plans, Computer
Certification and Accreditation, Security Vulnerability and Countermeasures
Analyses, Security Concepts of Operations, and other system security
engineering-related documents identified in MIL-STD 1785, DoDI 5000.02,
Operation of the Adaptive Acquisition Framework, and DoDI 8510.01
Support the system/application Authorization and Accreditation (A&A)
effort to include assessing and guiding the quality and completeness of A&A
activities, tasks and resulting artifacts mandated by governing DoD and Air
Force policies (i.e., Risk Management Framework (RMF)
Update, monitor, and manage information in systems for the program office.
Process and manage system user account requests and process tools.
Process and manage system port/protocol and access control list requirements.
Process and manage system Public Key Infrastructure (PKI) identification
and authorization requirements.
Manage the distribution, implementation, remediation, and tracking of
system security updates and configurations as required by the DoD.
Recommend policies and procedures to ensure information systems reliability
and accessibility to prevent and defend against unauthorized access to
systems, networks, and data.
Conduct risk and vulnerability assessments of planned and installed
information systems to identify vulnerabilities, risk, and protection needs.
Promote awareness of security issues among management and ensuring sound
security principles are reflected in organizations' vision and goals.
Conduct systems security evaluations, audits, and reviews.
Recommend systems security contingency plans and disaster recovery procedures.
Recommend and implementing programs to ensure that systems, network, and
data users are aware of, understand, and adhere to systems security
policies and procedures.
Participate in network and systems design to ensure implementation of
appropriate systems security policies.
Recommend initial, or updates to, software and configurations to new or
existing system security mechanisms.
Obtain waivers to mandated security mechanisms/policies which would be
detrimental to system performance and impact the system's mission.
Facilitate the gathering, analysis and preservation of evidence used in the
prosecution of computer.
Provide leadership assistance in the analysis of the design, development,
integration, implementation and testing of cybersecurity requirements.
Develop risk-based strategies to address identified gaps.
Review, analyze, and assess implementations of cybersecurity (i.e. RMF
security controls) throughout the open systems architecture and associated
services, derived requirements specifications, design documents & design
implementation
Collaborate with stakeholders (Government and commercial) to ensure the
system is approved by all Authorizing Officials via the RMF A&A process.
Provide technical advice in the area of systems security across all systems
and supports.
Develop recommendations for the Government regarding how well designs satisfy
current requirements and business goals.
Maintain databases that reflect receipt, storage, inventory, and
disposition of classified information to include data entry, updates, and
generation of reports.
Support Government program office in audits of Government classified holdings
to ensure proper accountability.
Maintain databases of classified visits and clearance levels
Perform inspection, inventory, logging, storage, documentation,
transmittal, and internal distribution of classified information received.
Evaluate Contractor classified data submittals for compliance with the
appropriate System Security Classification Guide (SSCG)
Provide security inspection and protection to areas where classified
information is being stored, and develop and establish security procedures
and policies IAW DOD, USAF, AFMC, and local directives.
Develop training and provide security awareness and other security education
programs.
Review and verify personnel qualifications for access to special access
programs.