What are the responsibilities and job description for the PNT Cyber Security Engineer position at Credence company?
PNT Cyber Security Engineer
Job Locations
US-MD-Aberdeen
2025-8998
Category
Management Analyst
Type
Regular Full-Time
Overview
Credence has a immediate need for a Cybersecurity Engineer in support the Army Positioning, Navigation and Timing (PM PNT) System Engineering and Technical Assistance (SETA) Program. The PM PNT provides administrative, business management, programmatic contracting, information technology (IT), program management, engineering, logistics, test and evaluation (T&E), training, operations, security, technology protection, foreign military sales, and acquisition and strategic planning services to the Army director PNT systems.
This position is hybrid requiring 2-3 days on site in Aberdeen, MD.
The SETA services provided to PM PNT shall support the planning, development, management, sustainment, and execution of the U.S. Army's PNT portfolio. PM PNT provides coordinated PNT system of systems architecture and associated PNT products for the Army's mounted and dismounted platforms. PM PNT is the Army's lifecycle manager for the Mounted Assured PNT System (MAPS), Dismounted Assured PNT System (DAPS), Assured Protection and ALTNAV Technology Development; and the Resiliency and Software Assurance Measures (RSAM)., as well as any future PNT efforts in both the Contiguous United States (CONUS) and outside the contiguous United States (OCONUS).
Responsibilities include, but are not limited to the duties listed below
Development and maintenance of acquisition cybersecurity strategies in support of Milestone Decisions.
- Support Configuration Management processes as the cybersecurity functional lead through the review and approval of Engineering Change Proposals (ECPs).
- Providing Information System Security Engineering (ISSE) recommendations to vendors to aid in the development of more secure and resilient systems.
- Coordinate, lead, and support cybersecurity developmental and operational tests such as the Cyber Table Top Exercise (CTTX), Cooperative Vulnerability Identification (CVI), Adversarial Cybersecurity Developmental Test & Evaluation (ACDT), Cooperative Vulnerability and Penetration Assessment (CVPA), and Adversarial Assessment (AA).
- Develop and maintain Risk Management Framework (RMF) Enterprise Mission Assurance Support Service (eMASS) Assess Only packages in support of tactical PIT devices through coordination with vendor on Security Technical Implementation Guide (STIG) development and Assured Compliance Assessment Solution (ACAS) scans.
Education, Requirements and Qualifications
Working Conditions and Physical Requirements
LI-Hybrid
Need help finding the right job?
We can recommend jobs specifically for you!
Click here to get started.