Cybersecurity Specialist

Fort Detrick, MD, United States

Applications have closed

Logistics Management Institute

With a legacy of solving the government’s most complex challenges and an outcome-driven model to execute above expectation, LMI transforms missions with solutions that define the new speed of possible.

View all jobs at Logistics Management Institute

Overview

We are seeking Cybersecurity Specialists to support the US Army Medical Materiel Agency’s (USAMMA) mission to develop, manage and perform end to end life cycle logistics on medical equipment to protect and sustain the Warfighter’s and their families for the Nation. The Cybersecurity Specialist will work directly with DoD and vendors running tests and evaluations on their medical equipment operating systems that will be sitting on the DoD network validating that the systems meets the DoD Risk Management Framework (RMF) requirements ensure the system is not vulnerable to inside and outside threats.

 

LMI is a consultancy dedicated to powering a future-ready, high-performing government, drawing from expertise in digital and analytic solutions, logistics, and management advisory services. We deliver integrated capabilities that incorporate emerging technologies and are tailored to customers’ unique mission needs, backed by objective research and data analysis. Founded in 1961 to help the Department of Defense resolve complex logistics management challenges, LMI continues to enable growth and transformation, enhance operational readiness and resiliency, and ensure mission success for federal civilian and defense agencies. 

Responsibilities

  • This position is responsible for working with the team supporting our DoD customer to ensure the appropriate administrative, physical and technical information security safeguards are implemented across a portfolio of deployed military medical devices.
  • Under general guidance of the Team Lead and the client, the incumbent will conduct information security assessments and testing to ensure the proper implementation of security controls across the environment. This includes populating defined security/risk assessments, identifying gaps and compensating controls, identifying remediation plans, and publishing management reports of results. This position may also participate in incident response investigations, help identify opportunities for product improvement, maintain policies and procedures that are designed to be operationally effective and efficient, and monitor compliance to policies, laws and regulations. The security specialist works with the DoD client to select and deploy technical controls to meet specific security requirements, and defines processes and standards to ensure that security configurations are maintained.
  • Conduct evaluations of technical and non-technical security safeguards to demonstrate and document compliance with the DoD's Risk Management Framework (RMF) requirements for security and interoperability. 
  • Perform information security risk assessments as part of the project lifecycle to ensure that new medical device technology conforms to security standards against internal and external threats.
  • Perform Independent verification and validation (IV&V) testing, to include documentation of Plan of Action and Milestones (POAM) data within the DoD system. 
  • Perform risk assessments of information and technology systems by conducting accurate and thorough assessments of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of information and technology systems.
  • Work with security leadership and stakeholders to identify remediation strategies and plans to enforce security requirements and address risks identified in the risk assessment process. 
  • Along with the Security Architect, advise during application development or acquisition projects to ensure that security controls are implemented as planned.
  • Work with other security department members and stakeholders in scoping, planning and conducting third-party penetration testing, code reviews, or security assessments during the information security process.
  • Perform risk assessments of third-party technology systems by conducting accurate and thorough assessments of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of DoD information and technology systems. 
  • Produce information security risk assessment reports that identify gaps with DoD Security Policies & Standards and propose remediation plans.
  • Assist in conducting information system activity reviews and participate in Risk Management Framework (RMF) testing exercises and activities: Monitor and test application and network activity for assurance that systems of controls are in place and effective, and for compliance to DoD policies and federal regulations.

Qualifications

  • Minimum of two (2) years relevant experience
  • Bachelor's degree preferred.
  • Public Trust Clearance (NACI)
  • Must have an active CompTIA Security Plus certification
  • Working knowledge internal controls & IT Risk Assessment and Mitigation procedures
  • Technical experience in security-related technologies such as encryption, remote access, anti-virus systems, etc.
  • A basic knowledge of the 8 domains of the Common Body of Knowledge for information security:
  • Security & Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

 

#LI-RS1

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  12  0  0

Tags: Clearance Compliance CompTIA DoD Encryption IAM Incident response Network security Pentesting POA&M Risk assessment Risk Assessment Report Risk management RMF Security assessment Vulnerabilities

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.