Colorado Technology Jobs

Colorado Jobs

Job Information

Odyssey Systems Consulting Group System Cybersecurity III - NCMC ITW/AA* in Colorado Springs, Colorado

DescriptionTitle: System Cybersecurity III - NCMC ITW/AALocation: Peterson Air Force Base (PAFB)Program: NCMC ITW/AA, Legacy Space: The two Program Offices sustainunique Integrated Tactical Warning / Attack Assessment, Legacy SpaceCommand and Control, and Cheyenne Mountain systems, networks, andassociated components through an enterprise-wide set of integrated missioncapabilities, support services, and data products. NCMC ITW/AA,specifically, provides authorities with accurate, timely, unambiguouswarning and attack assessment of air, missile, and space threats. TheLegacy Space Program Office provides space situational awareness, objecttrackiJob Responsibilities:Duties include, but not limited to:Ensure all system and application deliverables meet the requirements of allDoD and Air Force Cybersecurity policies.Ensure all system deliverables comply with DoD and Air Force cybersecuritypolicy, specifically DoDI 8500.01, Cybersecurity, and AFI 33-200, AirForce Cybersecurity Program Management.Ensure cybersecurity policy is implemented correctly on systems,Ensure compliance with DoD and Air Force Certification and Accreditationpolicies, specifically Department of Defense Instruction (DoDI)8510.01, Risk Management Framework (RMF) for DoD InformationTechnology, and AFI 33-210, The Risk Management Framework (RMF) forAir Force Information Technology.Support activities and meet the requirements of DoDI 8520.02, Public KeyInfrastructure (PKI) and Public Key (PK) Enabling, in order toachieve standardized, PKI-supported capabilities for biometrics, digitalsignatures, encryption, identification and authentication.Review, analyze, and support the preparation of various documents incompliance with the AF SEAM processes:Program Protection Plans (PPP)Anti-Tamper Plans (ATPs)Cybersecurity PlansTesting and/or Operation AuthorizationSystem Security Authorization Agreement (SSAA)System Security PlanSystem Threat AssessmentsQualifications:Valid DOD Top Secret clearanceUS CitizenshipPossess advanced knowledge, experience and recognized ability to beconsidered an expert in their technical/professional field.Possess the ability to perform tasks and oversee the efforts of junior andmid-level personnel within the technical/professional discipline.Demonstrate advanced knowledge of their technical/professional discipline aswell as possess a comprehensive understanding and ability to apply associatedstandards, procedures and practices in their area of expertise.Education and Experience: Advanced Degree (MA/MS) and 12 years ofexperience in the respective technical/professional discipline beingperformed, 5 years of which must be in the DoD OR, BA/BS degree, and15 years of experience in the respective technical/professional disciplinebeing performed, 5 of which must be in the DoD OR, 20 years of directlyrelated experience with proper certifications, 8 of which must be in the DoD.Certified in accordance with DoD 8570.01-M standardOdyssey Systems Consulting Group, Ltd. is an innovative small businesscommitted to providing world-class technical, management, and trainingsupport services to government and public sector clients. We focus onpeople, processes, and performance to deliver superior results. Since ourinception in 1997, our commitment to mission success and customersatisfaction has been recognized with exponential growth and exceptional pastperformance ratings. We accept challenging assignments and drive projects fromthe planning stages, through implementation, and into operations and support., including recruiting; hiring; placement; promotion; termination;layoff; recall; transfer; leaves of absence; compensation; and training.#LI-POSTEqual Opportunity Employer/Protected Veterans/Individuals with DisabilitiesThe contractor will not discharge or in any other manner discriminate againstemployees or applicants because they have inquired about, discussed, ordisclosed their own pay or the pay of another employee or applicant.However, employees who have acces