ACC ITSS IA Policy & Compliance Certified Professional
Job Number:
Location: Huntsville, AL
Required Clearance: Secret
Required Certification(s): DoD 8570 IAT-II
Required Education: Bachelor’s Degree in an IT, Engineering, or Technical discipline
Required Experience: 2+ years
Position Description:
Exeter Information Technology Services is seeking an IA Policy and Compliance Certified Professional to support our proposed staffing plan for the US Army Contracting Command (ACC) Chief Information Officer\G6 Headquarters (HQ), located at 4505 Martin Road, Redstone Arsenal (RSA), AL 35898-5000, provides contracting policy oversight to 100 different contracting offices and subordinate commands located world-wide. The ACC enterprise consists of over 6,200 military and civilian contracting professionals located at contracting offices across the contiguous United States (CONUS) and outside the contiguous United States (OCONUS). Information Technology (IT) services supports ACC’s global contracting mission to the warfighters through the full spectrum of military operations.
The HQ ACC’s Chief Information Officer (CIO) and G6 staff provides critical mission support services designed to enable the workforce with applicable secure technology solutions that will reduce and ultimately eliminate manual business processing and generate resource cost savings and efficiencies for the ACC enterprise.
Primary Responsibilities:
Improve the effectiveness of command owned information system-related cybersecurity risks management and reporting (contained in highly diverse environments of complex and sophisticated cyber threats, with ever-increasing system vulnerabilities, and rapidly changing missions);
Serve as the Cyber Privacy IA Specialist
Possess an understanding of Risk Management Framework (RMF)
Leverage the information/data findings and reports from the service provider, system owner, ISSM and the accreditation data repository; the regulatory guidelines in the cybersecurity regulatory documentation; and recent threat briefings; perform a detailed Risk Assessment Analysis that is not limited to:
o Update eMASS with the risk assessment information as applicable based on security classification levels.
o Maintain the eMASS record of each command owned information system or software.
o System-level artifacts (e.g. Continuous Monitoring Strategy, Continuity of Operations Plan, Interconnection Agreements, Hardware and Software Lists) analysis of cybersecurity controls compliance.
o Maintain System ISSM/ISSO established POA&Ms.
o Maintain legacy system accreditation documentation.
o Perform Continuous Monitoring of the system controls processes:
o Review and provide ISSM, SO and SCA with recommendations on new/updated system Security Plan details: system, system boundaries, identification, controls identification and selection, subsystems details, and external services
Required Qualifications:
Secret security clearance
DoD 8570.IAT Level II Certification
2 years of professional experience in Cybersecurity or IT programs
Bachelor’s degree in an IT, engineering, or technical discipline.
Preferred Qualifications:
Cyber Operations Center experience in operational measures and management.
NIST 800-53 and CNSSI 1253 knowledge and application experience
ACAS Scanner knowledge
IAM Level III Certification
Preference in hiring will be given to applicants with incumbent and/or prior ACC ITSS experience.
Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status.
#Clearancejobs