Skip to content
  Thursday 15 January 2026
Trending
November 17, 2025Cybersecurity Network Defense Specialist May 24, 2024Cybersecurity Analyst January 7, 2025Account Executive – Secureworks Cybersecurity Sales – US Remote Philadelphia December 7, 2024<h3>Shielding Executives After UHC CEO’s Tragic Murder</h3> February 3, 2025Lead Cybersecurity Detection Engineer March 5, 2025<h3>Broadcom Swiftly Fixes Critical Zero-Day Flaws in VMware ESXi</h3> October 13, 2023UK Regulator CMA to Examine Microsoft and Other Cloud Service Providers November 6, 2023Senior Staff Cybersecurity Test Exploitation, Orlando January 23, 2025Future of Web Exposure: 2025 and Beyond November 4, 2023Senior Staff Cybersecurity Test Exploitation, Orlando
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Cybersecurity Engineer
Careers

Cybersecurity Engineer

SecuredyouadmSecuredyouadm—January 24, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Cybersecurity Analyst

June 22, 2024

Senior RMF/ISSO Cybersecurity Engineer

May 26, 2025

Space Force Cybersecurity Policy Expert

September 7, 2024

Senior Cybersecurity & Compliance Engineer

December 27, 2025

Overview:Cybersecurity EngineerBe the DifferenceAstrion offers comprehensive services that boost preparedness, optimize performance, and ensure success across various domains, from Cyber to Digital, Mission and Systems, servicing our nation’s Civilian, Defense and Space communities. We support customers with Centers of Excellence in Washington DC, Huntsville, AL and Burlington, MA with an additional 36 locations across the U.S.Astrion has an exciting opportunity for a Cybersecurity Engineer to support the Force Protection Division, which is within the USAF Digital Directorate and located at Hanscom AFB, MA.WORK LOCATION: Desired location is at Hanscom AFB (BUT position has been approved for Remote work)WORK STATUS: Full-time; salariedResponsibilities:

  • Assist with development of System Security Management Plans, Program Protection Plans, Security Risk Analyses, OPSEC Plans, Computer Certification and Accreditation, Security Vulnerability and Countermeasures Analyses, Security Concepts of Operations, and other system security engineering-related documents identified in MIL-STD 1785, DoDI 5000.02, Operation of the Adaptive Acquisition Framework, and DoDI 8510.01
  • Support the system/application Authorization and Accreditation (A&A) effort to include assessing and guiding the quality and completeness of A&A activities, tasks and resulting artifacts mandated by governing DoD and Air Force policies (i.e., Risk Management Framework (RMF) to support the AOC WS request for variance process. Review, validate, and work with the AOC WS ISSM to support the approval for both Site and Supported Requests for Variance (RFV) for over 20+ sites.
  • Support the approval or denial based on SPO Cyber RFV checklist Appendix D, as documented in Request for Variance Business Process for the Air Operations Center, ABP 005.
  • Review RFV artifacts including the site security test reports, PPSM, site POA&M, and all applicable cuber documentation then draft recommendation to the AOC WS ISSM
  • Provide Validation and Verification Assessment (VVA) Support implementing the continuous monitoring outlined in the AOC WS Continuous Monitoring Plan and AFI 17-101, Step 6 of RMF. Conduct VVA IAW Program Management Office (PMO) Validation and Verification Assessment (VVA) Business Process Guide, ABP 024.
  • Boots on Ground Assessment – Provide security assessments of subset of AOC WS baseline systems
  • Firewall evaluation IAW Annex E (approved PPSM for AOC WS)
  • Network evaluation IAW AOC WS CM releases
  • Windows server/clients and Red Hat server evaluations IAW AOC WS CM releases
  • Assess GPOs applied, Patches, ePO Policy settings, etc.
  • Develop site specific worksheet/POA&M and provide to site to close open finding
  • Work with site to ensure all open findings are closed IAW cyber plan/previously released CSUs and AREs
  • Work with PC to determine root cause of open findings/missing from current documents, missing scripts, etc
  • JIRA Support – Work with site to open tickets to help resolve cyber issues
  • Provide security assess and validate RFVs configurations IAW RFV test data and documentation
  • Update, monitor, and manage information in systems for the program office
  • Process and manage system user account requests and process tools
  • Process and manage system port/protocol and access control list requirements
  • Process and manage system Public Key Infrastructure (PKI) identification and authorization requirements
  • Manage the distribution, implementation, remediation, and tracking of system security updates and configurations as required by the DoD
  • Recommend policies and procedures to ensure information systems reliability and accessibility to prevent and defend against unauthorized access to systems, networks, and data
  • Conduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risk, and protection needs
  • Promote awareness of security issues among management and ensuring sound security principles are reflected in organizations’ vision and goals
  • Conduct systems security evaluations, audits and reviews
  • Recommend systems security contingency plans and disaster recovery procedures
  • Recommend and implementing programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures
  • Participate in network and systems design to ensure implementation of appropriate systems security policies
  • Recommend initial, or updates to, software and configurations to new or existing system security mechanisms
  • Obtain waivers to mandated security mechanisms/policies which would be detrimental to system performance and impact the system’s mission
  • Facilitate the gathering, analysis and preservation of evidence used in the prosecution of computer
  • Provide leadership assistance in the analysis of the design, development, integration, implementation and testing of cybersecurity requirements
  • Develop risk-based strategies to address identified gaps
  • Review, analyze, and assess implementations of cybersecurity (i.e. RMF security controls) throughout the open systems architecture and associated services, derived requirements specifications, design documents & design implementation
  • Collaborate with stakeholders (Government and commercial) to ensure the system is approved by all Authorizing Officials via the RMF A&A process
  • Provide technical advice in the area of systems security across all systems and supports
  • Develop recommendations for the Government regarding how well designs satisfy current requirements and business goals
  • Maintain databases that reflect receipt, storage, inventory, and disposition of classified information to include data entry, updates, and generation of reports
  • Support Government program office in audits of Government classified holdings to ensure proper accountability
  • Maintain databases of classified visits and clearance levels
  • Perform inspection, inventory, logging, storage, documentation, transmittal and internal distribution of classified information received
  • Evaluate Contractor classified data submittals for compliance with the appropriate System Security Classification Guide (SSCG)
  • Provide security inspection and protection to areas where classified information is being stored, and develop and establish security procedures and policies IAW DOD, USAF, AFMC, and local directives
  • Develop training and provide security awareness and other security education programs
  • Review and verify personnel qualifications for access to special access programs
  • Develop, implement and maintain a communications security program
  • Assess program disclosure issues and provide FMS case management support
  • Assist and advise FMS program office management and leadership in interfacing with FMS customers and all USG organizations, including but not limited to SAF/IA, Air Force Security Assistance Center (AFSAC), Air Force Security Assistance Training (AFSAT) squadron, Defense Finance and Accounting Services (DFAS)
  • Support execution of all aspects of acquisition program security throughout a program’s lifecycle
  • Assist with development of sound security practices and policies regarding acquisition, physical, personnel and documentation security
  • Update security classification guides
  • Prepare acquisition security related sections of acquisition program documentation
  • Review Contractor deliverables to ensure compliance with CDRLs
  • Plan and implement security-related surveys, assessments, and studies
  • Evaluate program security information and hardware throughout the program life cycle, to include studies, analyses, plans, procedures, production, test plans/results, transportation, technology, and storage of end items
  • Provide security support to source selections

Qualifications:Citizenship: Must be a US citizenClearance: Must have an active US Secret level clearanceEducation: Bachelor’s Degree and 7 years of experience in the respective technical/professional discipline; to include five (5) years of DoD experience:

  • Understanding of cybersecurity in DoD cloud infrastructure
  • Understanding of Agile methods, including CI/CD, DevSecOps, and DevOps
  • Possess the ability to effectively communicate in both written and verbal forms on highly technical topics
  • Security+ CE Certification
  • SSCP or CISM Ceritifications (or equivalent) OR the ability to obtain one within the first 6 months of employment

What We Offer

  • Competitive salaries
  • Continuing education assistance
  • Professional development allotment
  • Multiple healthcare benefits packages
  • 401K with employer matching
  • Paid time off (PTO) along with a federally recognized holiday schedule

Who We AreAt Astrion, we innovate, elevate, and shape the world of tomorrow. At our core is our purpose to “Be the Difference”. This means we encourage our employees to take action and be the driving force for positive change. We foster an environment where innovative solutions flourish and our company continuously evolves.We have a culture of care, empathy, and making a tangible difference within our organization and communities. We embrace continuous learning, growth, and innovation, and pushing the boundaries of what’s possible. We promote collaboration and empowering our teams is at the core of our success.Join Astrion and Be the Difference in your career and the world!Astrion is an Equal Employment Opportunity/Affirmative Action Employer. We provide equal employment opportunities to all employees and applicants for employment and prohibit discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.#CJ#DICEEPASS HB#LI-ST1EPASS HB#LI-ST1Hanscom AFB# DICE#CJ
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Cybersecurity Research Intern
Senior Cybersecurity Operations Product/Project Manager
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Analyst

January 14, 20260
Careers

Lead Cybersecurity – SOX

January 14, 20260
Careers

Senior Cloud Security Engineer, AVP – BXTI Cybersecurity

January 14, 20260
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Analyst

January 14, 20260
Careers

Lead Cybersecurity – SOX

January 14, 20260
Careers

Senior Cloud Security Engineer, AVP – BXTI Cybersecurity

January 14, 20260
Careers

Sr. Cybersecurity Analyst, Compliance

January 14, 20260
Careers

Cybersecurity Analyst

January 14, 20260
Careers

CYBERSECURITY ANLST SR

January 14, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Analyst
  • Lead Cybersecurity – SOX
  • Senior Cloud Security Engineer, AVP – BXTI Cybersecurity
  • Sr. Cybersecurity Analyst, Compliance
  • Cybersecurity Analyst

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures