What are the responsibilities and job description for the RMF Supply Chain Risk Management Specialist position at The Judge Group?
The Judge Group is currently seeking a RMF Supply Chain Risk Management Specialist with an active top secret clearance. This position offers a hybrid schedule. For immediate consideration email you resume to rkissinger@judge.com.- Robbie Kissinger
Risk Assessment and Mitigation :
- Conduct comprehensive risk assessments of suppliers and vendors, evaluating their security posture against RMF guidelines to identify potential vulnerabilities within the supply chain.
- Develop and implement security controls based on identified risks, including data protection measures, physical security protocols, and access controls.
- Monitor supplier compliance with security requirements and address any deviations through corrective action plans.
- Help ensure that the software resulting from the SDLC meets the organization's expectations by defining and using criteria for checking the software's security during development
- Ensure that all components of the environments for software development are strongly protected from internal and external threats to prevent compromises of the environments or the software being developed or maintained within them. Examples of environments for software development include development, build, test, and distribution environment
- Help prevent unauthorized changes to code, both inadvertent and intentional, which could circumvent or negate the intended security characteristics of the software
- Help software acquirers ensure that the software they acquire is legitimate and has not been tampered
- Preserve software releases in order to help identify, analyze, and eliminate vulnerabilities discovered in the software after release
- Identify and evaluate the security requirements for the software;
- Determine what security risks the software is likely to face during operation and how the software's design and architecture should mitigate those risks
- Justify any cases where risk-based analysis indicates that security requirements should be relaxed or waived
- Help identify vulnerabilities so that they can be corrected before the software is released to prevent exploitation. Using automated methods lowers the effort and resources needed to detect vulnerabilities. Human-readable code includes source code, scripts, and any other form of code that an organization deems human-readable
Vendor Management and Due Diligence :
Required Skills and Qualifications