Job Details
Hiring Organization | ANALYGENCE, Inc. |
Post Name | Security Specialist |
Qualification | Bachelor’s degree in a related field and a minimum of 3 years of experience in a related role |
Industry | Private |
Employment Type | Full Time |
Work Hours | 8 Hours |
Salary | USD 20 To USD 26 Per Hour |
Location | San Antonio, Texas, United States 78205 |
Company Description
ANALYGENCE, derived from a combination of Analysis & Intelligence, is a service-disabled veteran-owned professional service small business. We were built on the principle of providing our customers with results-driven professionals that understand the dynamic customer environment and can be relied upon to help them achieve their objectives.
ANALYGENCE works with customers to develop and execute innovative strategies to improve processes and achieve customer goals. Our people are service-oriented professionals with the varying military, government, and industry backgrounds.
Who understand the level of commitment and flexibility it takes to progress customers forward in a dynamic work environment. Our vision is to support, nurture, and inspire people to achieve the missions of our customers and our organization.
Job Description
The Air Combat Command’s 67th Cyberspace Wing (67 CW), 346th Test Squadron (346TS) plans, executes, and contributes as both an operational and participating test organization in a full array of operational tests of various cyber weapons in coordination with the 318 Range Squadron (318RANS) who provides instrumented cyber range services, through both physical hardware and virtual systems.
In support of this mission, ANALYGENCE is seeking a Security Specialist to ensure the security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.
Specifically, the Security Specialist shall:
- Conduct semi-annual self-inspections, update inspections, checklists and report inspection results to leadership
- Perform information security operations including TEMPEST inspections and personnel training, operations security, and industrial security management
- Maintain security continuity and provide security reviews of test plans, test reports, appraisals, award nominations, test documentation, attend quarterly security meetings, secure facility visitation logs, and other documentation as required
- Process proxy badge requests for physical entrance to the facility, visit requests for personnel, visits to outside agencies and visitations from other organizations (including Foreign Nationals for approval), and requests for equipment used within the secure facilities
- Conduct an annual audit of entry credentials and proxy badges
- In-process and train new personnel on security policies and practices
- Provide Document Destruction System (DDS) management to ensure unneeded documentation is destroyed properly
- Process compelling need letters to allow disclosure of secure materials on a need-to-know basis, process strict security requests for the introduction or removal of vendor-owned equipment, requests for courier cards, and one-time courier authorization letters
- Provide thorough sanitization, serial number validation, and documentation of identified equipment for the Defense Reutilization and Marketing Office (DRMO)
- Maintain passwords and combinations of secure storage equipment and end-of-day SF Form 701s (security check forms)
- Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
- Provide input on security requirements to be included in statements of work and other appropriate procurement documents
- Analyze candidate architectures, allocate security services, and select security mechanisms
- Develop a system security context, a preliminary system security Concept of Operations (CONOPS), and define baseline system security requirements in accordance with applicable cybersecurity requirements
- Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents
- Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately
- Assess and design security management functions as related to cyberspace
Qualifications
- Current Top Secret clearance with SCI eligibility
- Bachelor’s degree in a related field and a minimum of 3 years of experience in a related role
- Knowledge of Security Assessment and Authorization process, industry-standard and organizationally accepted analysis principles and methods.
- Knowledge of multi-level security systems and cross-domain solutions, Personally Identifiable Information (PII) data security standards
- Knowledge of the organization’s evaluation, validation criteria, and demilitarized zones
- Knowledge of network design processes, including an understanding of security objectives, operational objectives, and trade-offs
- Knowledge of access authentication methods
- Skill in designing countermeasures to identify security risks
- Skill in designing the integration of hardware and software solutions
- Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes
- Skill in designing multi-level security/cross-domain solutions
- Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities in applications (e.g., S/MIME email, SSL traffic)
- Skill in applying security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model)
- Skill in translating operational requirements into protection needs (i.e., security controls)
- Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
- Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations
- Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization’s enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF])
- Ability to communicate effectively when writing, conduct vulnerability scans, and recognize vulnerabilities in security systems
- Ability to apply secure system design tools, methods, and techniques
- Ability to serve as the primary liaison between the enterprise architect and the systems security engineer and coordinate with system owners, common control providers, and system security officers on the allocation of security controls as a system-specific, hybrid, or common controls
- Ability, in close coordination with system security officers, to advise authorizing officials, chief information officers, senior information security officers, and the senior accountable official for risk management/risk executive (function), on a range of security-related issues (e.g. establishing system boundaries; assessing the severity of weaknesses and deficiencies in the system; plans of action and milestones; risk mitigation approaches; security alerts; and potential adverse effects of identified vulnerabilities)
Additional Information
ANALYGENCE is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class.
ANALYGENCE requires all employees to be fully vaccinated against COVID-19. In accordance with applicable law, ANALYGENCE may provide an exemption to this requirement as a reasonable accommodation due to a disability or a sincerely held religious belief or practice that prevents receipt of the vaccine.