Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
- Develop and update security authorization packages and relevant documentation, including the System Security Plan, Risk Assessment Report, Security Assessment Plan and Report, Contingency Plan, Incident Response Plan, Standard Operating Procedures, Plan of Actions and Milestones, Remediation Plans, Configuration Management Plan and others as necessary.
- Contribute to the development and maintenance of security policies, standards, and procedures to ensure a strong security posture.
- Ensure documentation is up-to-date and reflects current best practices.
- Support compliance efforts by conducting security audits, gathering evidence, and preparing reports to demonstrate adherence to industry standards and regulations.
- Assist with the development and implementation of compliance frameworks.
- Work closely with the Cyber Engineer, development, operations, and compliance teams to integrate security best practices into applications, infrastructure, and business processes. Communicate effectively with both technical and non-technical stakeholders.
- Provide regular reports on security posture, incident response activities, vulnerability management progress, and other key metrics to management.
- Monitor security tools and logs for suspicious activity, investigate security alerts, and participate in incident response efforts, including containment, eradication, and recovery.
- Contribute to post-incident analysis to identify lessons learned and improve future response strategies.
- Bachelor’s degree in Computer Science/Cybersecurity or relevant field
- 4+ experience in developing and implementing systems information security standards and procedures in the DoD enterprise and cloud environments (GovCLoud, IL4/IL5)
- Proven expertise with DISA STIGs, NIST SP 800-53 security controls, and the DoD Risk Management Framework (RMF)
- Familiarity with securing CI/CD pipelines
- Familiarity with DevSecOps software factories
- Familiarity with cloud and container security
- Security+ Certification or other IAT Level II certification
- Vulnerability management and analysis expertise
- Experience contributing to DevSecOps teams
- Experience in a Secure Software Development Lifecycle environment
- Knowledge of analyzing source code (SAST/SCA)
- Secure Software Design and Implementation
- Demonstrated proficiency in reading comprehension by distilling complex technical information into clear, concise, and actionable content
- Strong writing skills with experience drafting executive summaries, leadership reports, and technical documentation tailored to both technical and non-technical audiences
- Amazon Web Services (AWS)
- Familiarity with Agile development (Scrum/Large-Scale Scrum)
- Experience with a SIEM to monitor application and infrastructure security
Key Skills
Ranked by relevanceReady to apply?
Join BAM Technologies, LLC and take your career to the next level!
Application takes less than 5 minutes