Space Force Cybersecurity Policy Expert with Security Clearance Law Enforcement & Security - Odenton, MD at Geebo

Space Force Cybersecurity Policy Expert with Security Clearance

R-00132732 Description Are you ready to make an impact and join a small, tight-knit group of professionals? We're looking for innovative minds with experience in Space operations to help the nation's youngest military service keep our space capabilities the premier force in the worldThe Leidos National Security Sector currently has an opening for a Space Force Cybersecurity Policy Expert at Fort Meade, MDThis position is part of a large program supporting Air Combat Command's (ACC) Intelligence Surveillance and Reconnaissance (ISR) missionThe Space Force Cybersecurity Policy Expert will develop and implement US Space Force (USSF) Cybersecurity policy and guidance and specific business practices.
The candidate will help the Space Force Cryptologic Office (SFCO) enhance multi-domain operations and cyberspace capabilities against cyber-attack by working with multiple mission partners to deliver tailored Cybersecurity Service Provider (CSSP) solutions to USSF componentsWorkload will encompass Protective Domain Name Services, Attack Surface Management and Threat Intelligence Collaboration activities Primary
Responsibilities:
o Document and execute policies compliant with DoD, USSF, NSA, NISSPOM, and NIST Special Publications.
Promote rigorous awareness of cyber policy and strategy amongst USSF senior leaders and ensure sound principles are reflected in the organization's mission, vision, and goals.
Develop Cybersecurity Division (CSD) compliant Cyber and Information Assurance plans that reflect USSF mission objectives, operations plans, Plan of Action and Milestones (POA&M) and Planning, Programming, and Budgeting System (PPBS) constraints.
Work independently or in conjunction with mission partners to develop policy, programs, and guidelines for implementationInterpret and apply applicable laws, statutes, and regulatory documents and integrate into policy.
Develop and disseminate Cybersecurity Vulnerability Management alerts, bulletins, and Security Technical Implementation Guides (STIGS).
Analyze unit host systems for indicators of Malicious Cyber Activity (MCA), Insider Threat, or lack of Defensive Cyber Operations best practices, document and report findings, and help implement risk mitigating corrective actions Oversee Risk Management Framework (RMF) management and execution activities.
Perform cyber threat analysis and reporting on information derived from various intelligence sources.
Conduct Information Assurance and Cyber Defense training and briefings on an as needed basisBasic
Qualifications:
o Bachelor's Degree with 15
years of relevant experience or Master's Degree with 12
years of relevant experience.
Extensive familiarity with applicable DoD and NSA Policy and Guidance, Operations, and Staff Functions.
Possess an IAM Level II certification.
Active TS/SCI with polygraphEIO2024 Original Posting Date:
2024-04-03While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed abovePay Range:
Pay Range $122,200.
00 - $220,900.
00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salaryAdditional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Recommended Skills Business Requirements Dns Financial Management Information Assurance Insider Threat Negotiation Apply to this job.
Think you're the perfect candidate? Apply on company site Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.