This position is the F-35 Joint Reprogramming Enterprise (JRE) Cyber Security Engineering (CSE) Technical Lead.
This scope of this position covers the United States Reprogramming Lab (USRL), Australian, Canadian, United Kingdom Reprogramming Lab (ACURL), Norway, Italy Reprogramming Lab (NIRL) and RC-West. As the Tech Lead you will ensure that the systems are designed, developed, sustained, and documented to support required security Assessment and Authorization (A&A) efforts. Responsibilities include ensuring that cyber security requirements are properly defined, decomposed, and allocated and that the solution will satisfy applicable Government regulations. This includes conducting working groups, design reviews, and formal artifact reviews. Additionally, responsibilities include the timely delivery and support of A&A documentation and coordinating approvals to achieve Program Milestones. This position works in close coordination with the F-35 JPO IPT and the F-35 Development IPT throughout the complete life-cycle for the JRE Boundary. This includes new architecture, design, development, and integration of new architectural features maintaining the integrity and security of systems and networks.
Summary of responsibilities include but are not limited to:
* Lead technical strategic planning of current and future JRE configurations. * Development and/or review of architectural security designs to ensure compliance to standards and processes. * CSE related Project Management Oversight and resource planning * Execution schedules for all on-going efforts for the given boundary * Support of proposal and Basis of Estimate as well as Earned Value oversight for the given boundary * Complete collection, development, and delivery of the necessary artifacts to ensure Authority to Operate (ATO) is obtained as required to meet Program Milestones.
Must be willing to travel.
Must be a US citizen. This position requires special access and a Secret clearance updated within the last 6 years to be considered.
* Bachelor Degree in a STEM discipline from an accredited institution or equivalent * Experience with information security tools, concepts and issues across a broad range of technologies. * Experience supporting Security Assessments, to include Security Technical Implementation Guidance (STIG) testing and ACAS/Nessus scanning. * Experience with vulnerability management processes and procedures * Experience with IA/Cybersecurity policy implementation; * Experience with security policy and compliance * Experience analyzing and defining security requirements
Let your dream job find you.
Sign up to start matching with top companies. It’s fast and free.