Skip to main content

This job has expired

Program Manager

Employer
FEDITC LLC
Location
Fort Belvoir, VA
Closing date
Jan 21, 2022
Job DetailsLevelManagementJob LocationFort Belvoir - Fort Belvoir, VAPosition TypeFull TimeEducation Level4 Year DegreeDescriptionFEDITC, LLC is a fast-growing business supporting DoD and other intelligence agencies worldwide. FEDITC develops mission critical national security systems throughout the world directly supporting the Warfighter, DoD Leadership, & the country. We are proud & honored to provide these services.Overview of position:FEDITC is seeking an experienced Program Manager in Fort Belvoir, VA; the Pentagon, Washington, DC; or at other alternate locations within the National Capital Region. A United States Citizenship and Secret Clearance is required to be considered for this position. Responsibilities:Identify, and address authentication capabilities used in Enterprise environments across industry to identify alternatives for Army. Evaluate vendors and relevant technologies in the areas of Alternative Authentication and applicability to the missionProvide details of emerging ICAM technologies, for Army Senior Leadership knowledge and decision making.Coordinate and facilitate vendor demonstrations of emerging technology for the Army CIO Leadership. Identify, document, recommend and create artifacts to address ICAM related policy gaps.Provide technical updates and reports regarding alternative authentication technologies to drive standardization across the Army.Examine and document all new identity attributes needed to support the cybersecurity functions of the Army ICAM ecosystem. Conduct Integrated Process Teams (IPT) / Working Groups (WG) and other collaboration forums with ICAM and/or PKI stakeholders to develop products and garner buy-in for proposed ICAM and/or PKI solutions.Analyze and provide recommendations based on the maturity of products, vendor support and emerging technologies in accordance with NIST guidance for alternative authentication capabilities for logical access to Army IT Resources.Provide oversight and engineering reviews with ICAM stakeholders to evaluate existing and new alternative authentication capabilities and their applicability in the field.Examine and provide policy recommendations on how Army can standardize Non-Person Entities (NPE), Artificial Intelligence (AI), Robotic Process Automation (RPA) and Machine Learning (ML) capabilities and ways to automate their provisioning and across strategic and tactical environments.Develop, and/or update cybersecurity guidance for NPE, AI, RPA, and ML capabilities to enhance interoperability and gain IT efficiencies.Develop and update zero trust strategy, guidance, and reports that detail ICAM related capabilities support to the Army's evolving zero trust environment.Provide appropriate reports in the format requested such as, but not limited to, IPT/WG meeting minutes, Information/Decision Papers, Situation Reports (SITREPs), Points of Main Effort (POMEs), Weekly Activity Reports (WARs), Executive Summaries (EXSUMs), Briefings, etc.Provide updates and recommendations for Army.Directory and Identity Synchronization Service (DISS) capability CONOPS improvements.Provide policy guidance, updates and recommendations, and reports on current and evolving technical aspects of PKI.Research, assess, and manage internal and external taskers from Congress, NSA, DoD, Army, and other MILDEPS.Develop timelines and provide artifacts (ie, briefs, documents, info papers, lessons learned, etc.) that define current/ new standards, architectures, processes, and procedures IAW DoD PKI mandates / directives.Review, assess, coordinate, draft, and staff exceptions to PKI Policy requests for alternate Army approved solutions for Senior Leader Review.Capture (but are not limited to) standards, strategy, recommendations, cost analysis, integration concerns, product features, risk analysis, to drive collaboration across Army Community of Interest and address any policy gaps.Provide the government recommended changes based on the testing and evaluation of emerging technologies, and on the research and analysis completed across PKI.Provide support for the Army Cybersecurity Awareness Month and the Army Cybersecurity Awareness Forum by completing all required tasks, reports, presentation, preparation, and communication.Facilitate annual cybersecurity forum, coordinate with presenters, write pre and post forum documentation for awareness across the Army and complete all preparation tasks that support the event.Provide analysis of emerging National, Federal, and DoD cybersecurity policy, trends legislation and cyber threats to update the strategic Army Cybersecurity Strategy.Provide appropriate reports in the format requested such as, but not limited to, Information/Decision Papers, Situation Reports (SITREPs), Points of Main Effort (POMEs), Weekly Activity Reports (WARs), Executive Summaries (EXSUMs), Briefings, etc.Align the AP CSS guidelines, concepts, best practices, and requirements into all Army acquisition and sustainment programs to ensure consistency, veracity, and reliability across the implementation of cybersecurity into army programs.Assess current Federal, DoD, NSA, and Army regulations, available and emerging technologies, cyber threats, and requirements to revise army guidance to address policy gaps and ensure alignment with organizational cybersecurity missions and initiatives.Provide detailed Meeting Minutes/EXSUMS that capture results of IPTs / WG that details purpose/outcomes and create a historical traceable record of decisions and actions.Employ necessary technologies and methods to sustaining the content, context, and flow of the AP-CSS information to the Army community including but not limited to SharePoint, email, MS Teams, Army Portfolio Management Solution (APMS), and VTC.Provide reports in the appropriate formats such as, but not limited to, Situation Reports (SITREPs), Points of Main Effort (POMEs), Weekly Activity Reports (WARs), Briefings, Information Papers, etc. to prepare client to participate in various Army, DoD, or external forums.Analyze data to determine requirements, compliance, gaps, implicit and explicit task, trends, and needs of senior leadership to build/inform reports to be used to update CIO and Army leadership.Identify and document policy, resource and technical gaps, and emerging requirements to support compliance in each metric area.Initiate and participate in meetings as required, representing the scorecards and taskers as the subject matter expert, working with others to identify and satisfy requirements, recommendations, and guidance.Establish and maintain an up-to-date list of contacts for scorecard tasks.Organize, and/ or participate in IPT's, WG's and or other necessary collaboration forums or meetings with AO's and/ or other members of the Army Community of Interest (ie, Programs of Records (PoRs) and Non PoRs (ie, Post, Camps, Stations, Direct Reporting Units (DRUs), etc.)Ensure AO-Repository remains current across all Cyber Security Directorate maintained locations to include but is not limited to, on the DOD RMF Knowledge Service Army Policy PageAnalyze alternative methods for retaining AO-Repository data.Process AO nominations in accordance with DA PAM 25-2-12.Track the status of AO nominations Requests.Provide appropriate reports in the format requested such as, but not limited to, Situation Reports (SITREPs), Points of Main Effort (POMEs), Weekly Activity Reports (WARs), Slides, Executive Summaries (EXSUMS), Technology White Papers etc.Draft updates to AR 25-2. associated DA Pamphlets, and guidance memos to incorporate COMSEC policy, procedures, and instructions.Conduct as-is mapping of current inventory, develop technology plans, implementation plans, guidance, and instructions to assist the Army COMSEC community on the replacement of obsolete and divest legacy cryptographic devices.Develop risk mitigation plans, procedural recommendations, and progress tracking plans to modernize Army's COMSEC (encryption, Key management, radios, etc.) inventory.Develop, Cryptographic and Key Management new standards, metrics, timelines, strategy recommendations to integrate new emerging capabilities to meet prescribed regulatory guidelines.Assist the government lead with organizing IPTs and ensure COMSEC services and configuration management are aligned with DoD, Army initiatives and support network and security performance requirements.Assist and assess the Army's inventory, processing unit/organization equipment request, monitoring equipment programs, coordinating with vendors and government agencies, preparing, publishing annual guidance, policy, and direction for the Army's Cryptographic Modernization Strategic, Planning guidance and Roadmap.Develop memo/EXORD/CONOPS to provide annual guidance on ICAM integration phases.Develop ICAM and PKI implementation plan, roadmaps, metrics, guidance, instructions to track compliance IAW with DoD and DISA standards.Support, track, and manage the PKI Audit schedule; coordinate IPTs, in person or virtual audits, develop final assessments and document findings and corrective actions.Develop, update zero trust plans, timelines, develop planning tools and guidance's to reduce data breaches to protect data in applications, data, users' access, and devices.Develop concept plans that identifies means to keep unauthorized users off network, improve single sign-on for all Army application (on-premises, SaaS, IaaS, etc.)Facilitate working groups with key stakeholders to identify requirements, gaps, and timelines to implement Insider Threat and Privileged User activities metrics.Develop plans for new capabilities, that include interoperability and usability criteria to improve cybersecurity risk exposure from the legacy or modern ICAM and PKI capabilities.Develop timelines and provide artifacts (ie, briefs, documents, info papers, lessons learned, etc.) that define current/ new standards, architectures, processes, and procedures IAW DoD PKI mandates/ directives.Create a metric and conduct an assessment on divesting off legacy capability reduced duplication of effort (ie, Enterprise acquisition, licensing, etc. Build and deliver RMF status reports of the execution of Army RMF and implementation/migration to RMF 2.0; that includes compliant Army authorizations, system and POA expirations, continuous monitoring (CONMON) implementation status, and POA execution.Build and deliver implementation plans, risk assessments, research, and analysis in support of RMF and CONMON based on all Government regulations, plans, and direction.Build and deliver implementation plan, risk assessments, research, and analysis in support of the annual security FISMA requirements based on all Government regulations, plans, and direction.Build and deliver information papers, data analysis, reports, recommendations, and technical support/guidance on the implementation and support of RMF tools/solutions, ISSM and SCA-V activities, and performance metrics of Army's RMF operational assessments.Build, deliver, and assist in the development of cybersecurity technical implementation guidance in concert with Army stakeholders (ASA(ALT), ARCYBER/NETCOM, HQDA DCS G-3/5/7, and HQDA DCS G-9) for Operational Technology.Deliver an RPA strategy to automate RMF processes as a means of supporting CONMON and implement an RPA pilot to show viability of operational processes.Build, deliver, and implement all authoritative requirements that align with the EIEMA CS/IA Domain based on the Army Data Strategy and Army Directives.Build, deliver, and implement the Army's Commercial Temporary Exception to Policy (C-TEP) Program. This includes maintaining Army's portion of C-TEP entries within the DoD SNAP database, providing customer support for all new and existing C-TEP requests, and working with Army and DoD stakeholders.Build, deliver, and implement the DA PAM that supports Army's C-TEP Program IAW DoD and Army authorities.Clearance:Must be a US Citizen and pass a background checkMust complete a T3, submitted by government, with favorable reviewMaintain applicable Secret security clearance(s)FEDITC, LLC. provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex (including pregnancy), sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. FEDITC, LLC. complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.

Get job alerts

Create a job alert and receive personalized job recommendations straight to your inbox.

Create alert