Feb 21
Top Secret
Unspecified
Unspecified
Logistics
Fairmont, WV (On-Site/Office)
The Judge Group is currently seeking a RMF Supply Chain Risk Management Specialist with an active top secret clearance. This position offers a hybrid schedule. For immediate consideration email you resume to rkissinger@judge.com.
- Robbie Kissinger
Risk Assessment and Mitigation:
Vendor Management and Due Diligence:
Required Skills and Qualifications
- Robbie Kissinger
Risk Assessment and Mitigation:
- Conduct comprehensive risk assessments of suppliers and vendors, evaluating their security posture against RMF guidelines to identify potential vulnerabilities within the supply chain.
- Develop and implement security controls based on identified risks, including data protection measures, physical security protocols, and access controls.
- Monitor supplier compliance with security requirements and address any deviations through corrective action plans.
- Help ensure that the software resulting from the SDLC meets the organization's expectations by defining and using criteria for checking the software's security during development
- Ensure that all components of the environments for software development are strongly protected from internal and external threats to prevent compromises of the environments or the software being developed or maintained within them. Examples of environments for software development include development, build, test, and distribution environment
- Help prevent unauthorized changes to code, both inadvertent and intentional, which could circumvent or negate the intended security characteristics of the software
- Help software acquirers ensure that the software they acquire is legitimate and has not been tampered
- Preserve software releases in order to help identify, analyze, and eliminate vulnerabilities discovered in the software after release
- Identify and evaluate the security requirements for the software;
- Determine what security risks the software is likely to face during operation and how the software's design and architecture should mitigate those risks
- Justify any cases where risk-based analysis indicates that security requirements should be relaxed or waived
- Help identify vulnerabilities so that they can be corrected before the software is released to prevent exploitation. Using automated methods lowers the effort and resources needed to detect vulnerabilities. Human-readable code includes source code, scripts, and any other form of code that an organization deems human-readable
Vendor Management and Due Diligence:
- Evaluate potential vendors' security practices through thorough organizationally defined processes, attestation lists, and catalogs ensuring compliance with security requirements and compliance with OMB Memorandum M-22-18, Enhancing the Security of the Software Supply Chain through Secure Software Development Practices (M-22-18) (Sept. 14,2022).
- Establish security requirements for vendor contracts, ensuring compliance with company and industry standards.
Required Skills and Qualifications
- Strong understanding of the Risk Management Framework (RMF) , NIST SP 800-218 Secure Software Development Framework (SSDF) and its implementation within the supply chain environment.
- Active top secret clearance
- Expertise in cybersecurity principles, including data protection, network security, and access controls.
- Knowledge of CISCO products, Juniper, Arcsight, Windows, Linux, and different coding languages. Familiarity with GitLab, CI/CD concepts and
- Excellent analytical and problem-solving skills to identify and address security issues.
group id: cxjudgpa