Information Assurance III
Listed on 2026-01-07
-
IT/Tech
Cybersecurity, Information Security
Bryce Tech is a trusted leader in complex technology domains, delivering data-driven solutions in aerospace, biosecurity, and defense. We specialize in systems engineering, advanced analytics, R&D programs, and strategic advisory support. Our clients – including NASA, DoD, HHS, DHS, and other civil and national security agencies – rely on us to drive mission success and accelerate innovation.
Bryce Tech has been recognized in the Washington Technology Fast 50 ranking of top high-growth small businesses for five consecutive yearsand received aGovCon Contractor of the Year Award in 2025, underscoring our strong growth, competitive positioning, and excellence in federal contracting.
Job DescriptionBryce Tech is currently looking for an Information Assurance III specialist. This position will be supporting Joint Program Executive Office for Chemical, Biological Radiological Nuclear Defense (JPEO CBRND) – Joint Project Lead Integration on the CBRN IS team. The CBRN IS team delivers and enables a rapidly scalable, cloud-based application providing timely, fused, and easily accessible CBRN Warning Reporting and Hazard Prediction capabilities to the Joint Warfighter and international partners.
This role will protects and manage data integrity, confidentiality, and availability across systems.
The Person in this role will:
- examine JPEO- CBRND programs and system characteristics to determine whether compliance with DoDI 8500.01 is recommended or required and will develop an Acquisition Cybersecurity Strategy when required.
- Ensure that each JPEO-CBRND program, when required, has a Cybersecurity Strategy that is consistent with DOD policies, standards, and architectures, to include relevant standards.
- Assist in the identification of Critical Program Information (CPI) and Critical Technology in terms of their importance to the program being developed.
- Assist in the identification of foreign collection threat to the program, identify elements that require classification, and determine the phases at which such classification should occur and the duration of such controls.
- Provide support for Development Test (DT), User Demonstration (UD), User Feedback Event (UFE), Operational Assessment (OA), and Operational Test (OT) events and address each CPI as well as other relevant information requiring protection, including export-controlled information and sensitive but unclassified information.
- Manage the Host-Based Security System (HBSS) and install, configure, and maintain computer and network security software, including instances of the Assured Compliance Assessment Solution (ACAS), the Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) Viewer, and other cybersecurity software test and scanning software applications.
- Document programs’ overall cybersecurity approach and requirements, including determining the appropriate Certification and Accreditation (C&A) process, contributing content for Life Cycle Management Plans (LCMPs), assisting programs in the creation of a Security Classification Guide (SCG), and assisting in the development of Program Protection Plans (PPPs) Appendix E, the Cybersecurity Strategy.
- Leverage IEW services while working in conjunction with JPMs/JPLs /across the JPEO-CBRND to facilitate risk management framework activities.
- Ensure fielded information systems and networks are defended to maintain confidentiality, integrity, availability, authentication, and non-repudiation by identifying, developing, and applying risk management framework technical-, operational-, and management-related security controls and protection mechanisms.
- Guide JPEO-CBRND programs in the development of Acquisition Cybersecurity Strategy.
- Assist in the identification of Critical Technology and address CPI as well as other relevant information requiring protection, including export- controlled information and sensitive but unclassified information.
- Directly interface with JPMs/JPLs customers, representing JPMs/JPLs in discussions concerning cybersecurity, including (but not limited to) topics which address use of the DISA STIG in the software application and system development process,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).