Oasis Systems

Information Assurance Specialist (AFMOWAP)

US-AL-Montgomery / Maxwell-Gunter AFB
4 months ago
Requisition Number
2017-6304
Category
Engineering

Overview

PRIMARY FUNCTION:

This position provides Information Assurance support to the Air Force Medical Omnibus Web Applications (AFMOWAP) program office, which is within the Business Enterprise Systems Directorate (AFLCMC/HI) at Maxwell-Gunter AFB, AL.

 

     AFMOWAP is a family of 11 applications in sustainment that are used by the AF Medical community to manage information in direct support of active AF, ANG, and AFR units

 

 

 

Qualifications

QUALIFICATIONS:             

  • Possess at least 5 years of Information Assurance/Cyber Security Management Experience
  • Possess and maintain at least an IAM Level II Cyber Security Certification
  • Be able to apply knowledge of IA policy, procedures, and workforce structure to develop, implement and maintain a secure network environment.
  • A CAP, CISM, or CISSP certification is required.  However, the responsibility to attain a CISSP certification within 6 months is also a contingency that will be considered..
  • Candidate must be able to obtain, and maintain, the proper personnel clearance require for this position.

 

Responsibilities

RESPONSIBILITIES:

  • Develop, implement, and enforce policies and procedures reflecting the legislative intent of applicable laws and regulations for the network environment/system.
  • Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations.

  • Develop network environment/system security requirements specific to an IT acquisition for inclusion in procurement documents.

  • Recommend resource allocations required to securely operate and maintain an organization’s network environment/system IA requirements.

  • Participate in an Information System risk assessment during the C&A process.

  • Develop security requirements for hardware, software, and services acquisitions specific to network environment/system IA security programs.

  • Ensure that IA and IA enabled software, hardware, and firmware comply with appropriate network environment/system security configuration guidelines, policies, and procedures.

  • Assist in the gathering and preservation of evidence used in the prosecution of computer crimes.

  • Ensure that network environment/system Information System recovery processes are monitored and that IA features and procedures are properly restored.

  • Review IA security plans for the network environment/system.

  • Ensure that all IAM review items are tracked and reported.

  • Identify alternative functional IA security strategies to address organizational network environment/system security concerns.

  • Ensure that IA inspections, tests, and reviews are coordinated for the network environment/system.

  • Review the selected security safeguards to determine that security concerns identified in the approved plan have been fully addressed.

  • Evaluate the presence and adequacy of security measures proposed or provided in response to requirements contained in acquisition documents.

  • Monitor contract performance and periodically review deliverables for conformance with contract requirements related to network environment/system IA, security, and privacy.

  • Provide leadership and direction to network environment/system personnel by ensuring that IA security awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities.

  • Develop and implement programs to ensure that systems, network, and data users are aware of, understand, and follow network environment/system and IA policies and procedures.

  • Advise the DAA of any changes affecting the network environment/system IA posture.
  • Conduct network environment/system physical security assessment and correct physical security weaknesses
  • Help prepare IA certification and accreditation documentation
  • Ensure that compliance monitoring occurs, and review results of such monitoring across the network environment/system.

 

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed