Akima Global Technology (AGT) is a technology solutions, program management and support company that collaborates with technology partners and the federal government to deliver IT, management, staffing, recruiting, contracting and logistics services. Our personnel enjoy competitive benefits packages and challenging roles in work environments committed to innovation, diversity and opportunity for career growth. As an Alaska Native Corporation (ANC), 100% of our companys profits go back to our more than 14,000 Iupiat shareholders that have resided near and above the Arctic Circle for more than 10,000 years. Our business helps support their way of life and contributes to the survival of a culture that has thrived in a challenging environment.
Job Summary:
Support in identifying cybersecurity deficiencies in information systems by performing technical assessments of assigned systems and applications to determine the severity of weaknesses; Supports the Security Authorization (SA) and Continuous Monitoring (CM), Risk Management Framework (RMF) process. Results of the assessments will be documented in the MGMT compliance tool, (e.g., IACS, CSAM, etc.), utilizing a standard report format with the results and findings from the assessment, along with recommended mitigations. Results will also be entered into the compliance tool.
Responsibilities:
Develop and maintain an overall Security Assessment Schedule that forecasts system assignments for contractor and stakeholder staff over the period of performance. The Assessment schedule needs to include assessments that meet the requirements of current DHS policy. Systems in Ongoing Authorization (OA) need to be assessed once a year. Systems not in the OA program need to be assessed at a minimum every three years or when a major change occurs. The schedule also needs to support new systems utilizing the Authority to Proceed (ATP) memo. New systems utilizing the ATP process assess the critical controls prior to being placed in production and then require a full assessment within one year after receiving the ATP.
Develop testing artifacts for each system to include, as appropriate, the technical assessment plan, the Rules of Engagement (ROE), the Security Requirements Traceability Matrix (SRTM), the Security Assessment Report, and any other necessary documentation.
Update and maintain all testing templates and Standard Operating Procedures (SOP) as needed, or on an annual basis per DHS guidelines, to include the utilization of the compliance tool.
Create Assessment Guides to assist ISSOs, ISSMs, System Owners and other stakeholders to prepare for upcoming assessments. This includes but is not limited to Frequently Asked Questions (FAQs) guides, and Training Materials.
Conduct and/or review vulnerability scans, review device configurations, and review system architecture. The Contractor will utilize vulnerability assessment tools as provided by the government. Test tools used to support the assessment process may include but is not limited to Nessus (Vulnerability Scanner), WebInspect (performs web application security testing and assessment), IACS, CSAM, and AppDetective (database vulnerability scanner). These tools are subject to change.
Provide advisement and recommendations to the Government for assessment and security best practices including tools that are used for assessment activities.
Arrange for physical access to the system, if applicable, with the specific System Owner and the specific facility manager(s). All contact information will be provided by the systems Information System Security Officer (ISSO). Alternatives to physical access to the system may be utilized if it does not compromise the assessment of the controls needed to be accomplished.
Conduct an Assessment Kick-off meeting according to the Security Assessment Schedule that reviews the MGMT Compliance requirements, process, and artifacts to prepare the stakeholders for the scheduled assessment.
Conduct up to two check point reviews after the kickoff, and prior to the planned assessment date to review the status of the artifacts in the compliance tool. Provide the checkpoint information to the assessment division and conduct reviews with the stakeholders as needed. As part of the check point review, the assessor will provide detailed criteria that would result in significant findings on the assessment or prevent the assessors from conducting an accurate assessment.
Conduct an assessment entrance conference according to the Security Assessment Schedule that does a final overview of what is expected during the assessment.
Execute the assessment through the review of system security documentation, vulnerability scan results, audit logs, configuration guides, and any other additional materials provided by the system and system stakeholders.
Document the results of the technical assessments in the draft Security Assessment Report (SAR) with the criteria of the tests, testing methods, findings of the assessment and recommended mitigations. The draft SAR will be sent to the stakeholders one week prior the exit conference as defined in the Security Assessment Schedule.
Conduct an assessment exit conference according to the Security Assessment Schedule to review of the findings of the draft SAR and address any final agreed changes.
Based on the results of the exit conference, produce the Final SAR within 5 business days.of the conference.
The Final SAR will document the results of the technical assessments with the criteria of the tests, testing methods, findings of the assessment and recommended mitigations.
Collect and securely store all final materials and media submitted by the system test team according to the SOP in the DHS compliance system. Draft systems assessment may use other DHS MGMT owned systems as appropriate.
Job Location:
Currently remote due to COVID and building renovations. Must be located in the National Capital Region within the DC Metropolitan area or Stennis Data Center, Mississippi.
Minimum Qualifications:
Must have 8years of experience in Cybersecurity.
Must have an active CISSP, CISM, CRISC, CSSP, or Security+.
Bachelors Degree (preferablyin Computer Science or related field).
Must have an Active Top Secret Clearance.
The duties and responsibilities listed in this job description generally cover the nature and level of work being performed by individuals assigned to this position. This is not intended to be a complete list of all duties, responsibilities, and skills required. Subject to the terms of an applicable collective bargaining agreement, the company management reserves the right to modify, add, or remove duties and to assign other duties as may be necessary.We wish to thank all applicants for their interest and effort in applying for the position; however, only candidates selected for interviews will be contacted.
We arean equal opportunity employer. All applicants will receive consideration for employment, without regard to race, color, religion, creed, national origin, gender or gender-identity, age, marital status, sexual orientation, veteran status, disability, pregnancy or parental status, or any other basis prohibited by law.
We are committed to Equal Employment Opportunity and providing reasonable accommodations to applicants with physical and/or mental disabilities. If you have a physical and/or mental disability and are interested in applying for employment and need special accommodations to use our website to apply for a position please contact, Recruiting Services at job-assist@akima.com or 571-353-7053. Reasonable accommodation requests are considered on a case-by-case basis.
The dedicated email and telephonic options above are reserved only for individuals with disabilities needing accessibility assistance to apply to an open position using our website.
Please do not use the dedicated email or phone number above to inquire on the status of your job application.
In order for our company to stay compliant with government regulations, please apply on line. Please DO NOT email resumes or call in lieu of applying online unless you have a physical and/or mental disability and need assistancewiththe online application.