×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Security RMF

Job in El Segundo, Los Angeles County, California, 90245, USA
Listing for: KBR, Inc.
Full Time position
Listed on 2025-12-01
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, Network Security, Information Security
Job Description & How to Apply Below
Position: Cyber Security RMF Support

Cyber Security RMF Support

K , Inc.

Join to apply for the cyber security RMF support role at K , Inc.

Belong. Connect. Grow. with K !

About K

K ’s National Security Solutions team provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security communities. In this position, your work will have a profound impact on the country’s most critical role – protecting our national security.

K  (formerly Lin Quest) is the prime contractor on the MSEIT contract. By applying to this position, you are in consideration for K  employment. However, you also have the option to be hired by one of our subcontractor teammates.

You will join a systems engineering team defining the next generation of space communication systems supporting US Space Force (USSF) satellite communications. You will support Systems Engineering & Integration (SE&I) activities in a multidisciplinary and collaborative environment. You will interface and collaborate with SE&I team members, contractors, government civilians and members of the USSF. You will lead and support several working groups responsible for leading technical discussion, resolve and identify risk, requirement gaps, developing briefings, writing, and tracking action items, and authoring meeting minutes.

The MILSATCOM Systems Engineering, Integration, and Test (MSEIT) effort provides leading edge Systems Engineering & Integration (SE&I) for the US Space Force’s Space Systems Center (SSC). We support the Space Force’s acquisition of state of the art satellite communications systems, providing global secure, survivable, and protected communications for our nation’s warfighters. We seek technical individuals who will thrive in a highly collaborative work environment of small teams, using the most modern tools and methodologies to tackle the challenges of integrating complex space and ground communications systems.

Why

Join Us?
  • Innovative Projects: K ’s work is at the forefront of engineering, logistics, operations, science, program management, mission IT and cybersecurity solutions.
  • Collaborative Environment:
    Be part of a dynamic team that thrives on collaboration and innovation, fostering a supportive and intellectually stimulating workplace.
  • Impactful Work:
    Your contributions will be pivotal in designing and optimizing defense systems that ensure national security and shape the future of space defense.
Key Responsibilities
  • Support the SSC with ensuring security, quality, timeliness, mission partner support, completeness, and regulatory compliance of ATO RMF documentation
  • Experience creating, editing and reviewing RMF, policy documents to implement administrative controls for each of the Rev 5 control families.
  • Experience developing and reviewing and performing self‑assessments of control narratives and System Control Traceability Matrix (SCTM)
  • Experiencing reviewing and editing ATO artifacts such as Ports, Protocol and Services, matrix and Hardware/Software lists.
  • Proposing, coordinating, implementing, and enforcing all Department of the Air Force information system security policies, standards, and methodologies
  • Familiarity with vulnerability assessments using the Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG), and the Security Content Automation Protocol (SCAP) Compliance Checker, incorporating automated Benchmarks
  • Knowledge of evaluating operating systems and network devices security configuration in accordance with Defense Information Systems Agency (DISA) approved Security Technical Implementation Guides
  • Performing security control continuous monitoring, security audits, risk analysis and developing mitigation strategies for DoD information systems
  • Ensures software, hardware, and firmware complies with appropriate security configuration guidelines (e.g., security technical implementation guides /security requirement guides)
  • Ensures proper configuration management procedures are followed prior to implementation and contingent upon necessary approval. Coordinate changes or modifications with the system‑level Information System Security…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary