Torch Technologies is seeking a Cybersecurity Information System Security Manager (ISSM) (Senior) to join a team that conducts advanced planning to achieve/maintain Authority to Operate (ATO) for systems assigned to the Air Force Human Resources Systems Division. This includes performing reviews and monitoring of Risk Management Framework (RMF) packages and oversight of 30K Common Control Indictors from the assessment of 4.8K Security Technical Implementation Guide checklist items, as outlined in the National Institute of Standards and Technology special publications, to ensure confidentiality, integrity, and availability of IT systems. This person will be responsible for accomplishing the 6-Step RMF process, developing test scripts, answering RMF controls in the Enterprise Mission Assurance Support Service (eMASS), developing security documentation, and other activities required to obtain an ATO for assigned systems. This position supports the AFLCMC/GB Business and Enterprise Systems Directorate (BES)/GBH Human Resources Systems Division at Randolph AFB, TX.
Responsibilities:
This position requires a highly motivated individual with experience in ensuring the appropriate operational security posture is maintained for the assigned IT. This includes the following related to maintaining situational awareness and initiating actions to improve or restore cybersecurity posture:
· Reviews and monitors security controls required to obtain an Authority to Operate (ATO) for assigned systems.
· Completes and maintains required cybersecurity certification IAW AFMAN 17-1303.
· Implements and enforces all AF cybersecurity policies, procedures, and countermeasures.
· Ensures all users have the requisite security clearances and need-to-know, complete annual cybersecurity training, and are aware of their responsibilities before being granted access to the IT according to AFMAN 17-1301;
· Maintains all authorized user access control documentation IAW the applicable AF Records Information Management System.
· Ensures software, hardware, and firmware complies with appropriate security configuration guidelines, e.g., security technical implementation guides/security requirement guides.
· Ensures proper configuration management procedures are followed prior to implementation and contingent upon necessary approval.
· Coordinates changes or modifications with the system-level ISSM, SCA, and/or the Wing Cybersecurity office; and,
· Reports security incidents or vulnerabilities to the system-level ISSM and wing cybersecurity office according to AFI 17-203, Cyber Incident Handling.