Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cyber Security SME image - Rise Careers
Job details

Cyber Security SME

Overview

Abacus Technology is seeking a Cyber Security SME to provide security expertise for Wright-Patterson AFB.  This is a full-time position.

Responsibilities

  • Maintain and support of DoD and Air Force computing systems and networks. 
  • Perform system trusted downloads, burn classified CDs, maintain and update host system patches, implement mandated system vulnerability mitigations and set up user accesses and accounts. 
  • Support the Systems Engineer with program engineering milestone reviews, test planning, and certification and accreditation packages. 
  • Assist the ISSM and provide multi-discipline expertise covering project management, system security engineering, system administration, and network administration. 
  • Provide cybersecurity support to assigned systems and assist in developing, modifying, reviewing, or coordinating items that include, but are not limited to PIT determination package, cybersecurity strategy, System Security Plan (SSP), system controls traceability matrix, risk assessment report, plan of action and milestones, security assessment plan, artifacts for program review and RFP. 
  • Review required program office artifacts and make recommendations to support cybersecurity RMF analysis. 
  • Assist in managing, planning, documenting, and conducting Independent Verification and Validation (IV&V) of security requirements for weapon systems. 
  • Perform cybersecurity site audits to verify architecture analysis, cybersecurity requirements, and controls, verify mitigation actions, witness cybersecurity testing, and evaluation, and to support final approval for Interim Authority to Test (IATT), Interim Authority to Operate (IATO), Authority to Operate (ATO), and/or Authority to Connect (ATC). 

Qualifications

15 years experience in cyber security.  Bachelor’s degree in a related field required; Master’s degree preferred.  Must be CISSP certified (or an equivalent certification in compliance with DoD 8570 IAT Level III) or able to obtain within six months of hire.  In-depth understanding of cybersecurity policy, tools, threat mitigation, network topologies, intrusion detection, PKI, and secured networks is preferred.  Knowledge of the Systems Security Engineering disciplines to include: Anti-Tamper, Trusted Systems & Networks, Cybersecurity, Hardware/Software/Firmware Assurance, Supply Chain Risk Management, Acquisition Security, Cyber Resiliency, and Information Protection.  Must demonstrate proficiency in currently utilized Windows OS, Windows group policy objects, DoD Cybersecurity, NIST RMF, STIGs, Endpoint Security System (SS)/Host-based Security System (HBSS) and DoD Public Key Infrastructure (PKI).  Able to clearly present and communicate technical approaches and findings.  Understands DoD, AF, and common engineering/scientific principles, processes, and procedures to improve performance and sustainability of existing and future AF and joint service weapon systems.  Must be a US citizen and hold a Top Secret clearance with SCI access (TS/SCI). 

 

Applicants selected will be subject to a U.S. government security investigation and must meet eligibility requirements for access to classified information.

 

EOE/M/F/Vet/Disabled

Average salary estimate

$115000 / YEARLY (est.)
min
max
$100000K
$130000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cyber Security SME, Abacus Technology

Are you passionate about cybersecurity and ready to take on a pivotal role? Abacus Technology is on the lookout for a Cyber Security SME to provide your expertise at Wright-Patterson Air Force Base in Fairborn. In this full-time position, you will be at the forefront of securing DoD and Air Force computing systems and networks. Your responsibilities will include conducting system trusted downloads, maintaining up-to-date host system patches, and implementing necessary system vulnerability mitigations. You’ll also support program engineering milestone reviews, assist with cybersecurity strategy development, and ensure compliance with required program office artifacts. If you have a knack for cybersecurity audits and can effectively communicate technical findings, this role is the perfect fit for you. With 15 years of experience in cybersecurity, preferably with a Master’s degree, your skills will shine as you manage Independent Verification and Validation of security requirements for weapon systems. Your expertise in cybersecurity policies, tools, and threat mitigation techniques will be invaluable as you assist in obtaining authorities for testing and operation of critical systems. Join us at Abacus Technology, where your knowledge and experience will have a substantive impact on national security while being part of an innovative and driven team.

Frequently Asked Questions (FAQs) for Cyber Security SME Role at Abacus Technology
What are the primary responsibilities of a Cyber Security SME at Abacus Technology?

As a Cyber Security SME at Abacus Technology, your primary responsibilities include maintaining and supporting DoD and Air Force computing systems, performing trusted downloads, managing system patches, and implementing security measures. You'll also assist in developing cybersecurity strategies and materials for system reviews and certifications.

Join Rise to see the full answer
What qualifications are required for the Cyber Security SME position at Abacus Technology?

The Cyber Security SME position at Abacus Technology requires 15 years of experience in cybersecurity and a Bachelor's degree in a related field, with a Master's preferred. You must also be CISSP certified or be able to obtain it within six months of hire, plus possess a strong understanding of cybersecurity policies and tools.

Join Rise to see the full answer
How does the Cyber Security SME support testing and credentialing for systems at Abacus Technology?

The Cyber Security SME supports testing and credentialing by reviewing program artifacts, conducting cybersecurity audits, and verifying compliance with required security controls. This role is crucial for obtaining authorities like IATO and ATO for system operations.

Join Rise to see the full answer
What type of security clearances are necessary for the Cyber Security SME role at Abacus Technology?

Candidates for the Cyber Security SME role at Abacus Technology must be U.S. citizens and hold a Top Secret clearance with SCI access (TS/SCI). This enables you to work closely with classified information and contribute effectively to national security efforts.

Join Rise to see the full answer
What skills are essential for a Cyber Security SME at Abacus Technology to succeed?

Essential skills for a Cyber Security SME at Abacus Technology include proficiency in Windows OS, an understanding of cybersecurity best practices like RMF and STIGs, strong communication abilities, and knowledge of various cybersecurity frameworks and risk management strategies.

Join Rise to see the full answer
Common Interview Questions for Cyber Security SME
Can you explain your experience with DoD cybersecurity policies?

When discussing your experience with DoD cybersecurity policies, it's important to highlight specific policies you've complied with, such as NIST RMF and STIG guidelines. Provide examples of how you've successfully implemented these policies in past positions.

Join Rise to see the full answer
How do you conduct risk assessments in your cybersecurity role?

When answering this question, focus on your methodology for conducting risk assessments, including identifying assets, vulnerabilities, and threats. Discuss tools or frameworks you utilize to quantify risks and how you communicate findings to stakeholders.

Join Rise to see the full answer
Describe a challenge you faced in a cybersecurity project and how you overcame it.

Use the STAR method to structure your answer, detailing the situation, task, action, and result. Highlight your problem-solving skills and ability to collaborate with team members to achieve a successful outcome in a challenging environment.

Join Rise to see the full answer
What are your strategies for vulnerability management?

Discuss your approaches to vulnerability management, such as regular system updates, establishing a patch management schedule, and utilizing various tools to scan for vulnerabilities. Emphasize the importance of proactive rather than reactive measures.

Join Rise to see the full answer
How do you stay updated with the latest cybersecurity trends and technologies?

Explain the methods you use to keep your knowledge current, such as attending conferences, following industry blogs, or participating in professional organizations. This shows your commitment to ongoing education in the cybersecurity field.

Join Rise to see the full answer
What role does communication play in your work as a Cyber Security SME?

Emphasize the necessity of clear communication in your role, especially when explaining technical concepts to non-technical stakeholders. Provide examples of how effective communication has facilitated successful project outcomes.

Join Rise to see the full answer
How would you handle a security incident in a classified environment?

Discuss your process for responding to cybersecurity incidents, highlighting the steps you would take: identification, containment, eradication, recovery, and lessons learned, all while ensuring compliance with DoD protocols.

Join Rise to see the full answer
Can you explain the importance of a System Security Plan (SSP)?

When discussing the SSP, outline its role in documenting security requirements and controls for a specific system. Explain how an SSP guides both implementation and compliance efforts, thereby enhancing overall security posture.

Join Rise to see the full answer
What methodologies do you employ for Independent Verification and Validation (IV&V)?

Provide insights into your IV&V methodologies, mentioning systemic approaches to verify security requirements and ensure compliance. Discuss how these methodologies help maintain quality assurance in cybersecurity practices.

Join Rise to see the full answer
What are some key metrics you utilize to measure cybersecurity effectiveness?

Discuss metrics such as incident response times, number of vulnerabilities addressed, user compliance rates, and security audit results. Highlight the importance of using metrics to drive continuous improvement in cybersecurity practices.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Take Risks
Collaboration over Competition
Growth & Learning
Transparent & Candid
Customer-Centric
Social Impact Driven
Rapid Growth
Passion for Exploration
Dare to be Different
Reward & Recognition
Friends Outside of Work
Medical Insurance
Dental Insurance
Vision Insurance
Mental Health Resources
Life insurance
Disability Insurance
Health Savings Account (HSA)
Flexible Spending Account (FSA)
Conferences Stipend
Bias Training
Employee Resource Groups
401K Matching
Paternity Leave
Maternity Leave
Some Meals Provided
Social Gatherings

Join Google as a Staff Network Security Engineer and play a crucial role in maintaining and enhancing the security of our expansive network.

Photo of the Rise User
Posted 12 days ago

Join T5 Data Centers as a Critical Facilities Technician and play a pivotal role in ensuring the reliability of their data center operations.

Photo of the Rise User

Join the City of Fort Worth as an IT Technical Support Analyst II, ensuring a robust network infrastructure that supports essential city services.

Photo of the Rise User
Visa Remote Bangalore, India
Posted 11 days ago

Become a key player in Visa’s People Technology Operations as a Systems Analyst, helping to support and enhance HR applications.

Next Step Systems Remote 1212 S. Naper Blvd., Boston, MA, United States
Posted 9 days ago

Our client is seeking a Senior Manager for Enterprise Systems Integrations to implement a robust integration strategy supporting their business strategy.

An opportunity to join a top-tier cloud services provider as a Senior Systems Engineer focusing on Linux-based systems and automation.

Photo of the Rise User
Visa Remote Basingstoke, United Kingdom
Posted 7 days ago

Join Visa as a Senior Consultant Systems Architect and lead the integration of technology and processes for our Visa Family of Companies.

Photo of the Rise User
Posted 12 days ago

Aetos Systems, Inc. seeks a technology expert to facilitate network solutions and security in a dynamic environment.

MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
April 24, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Columbus just viewed Support Associate-7 at Tory Burch
Photo of the Rise User
Someone from OH, Columbus just viewed Project Manager at Treering
Photo of the Rise User
Someone from OH, Columbus just viewed Product Manager, Assessment Student Experience at Ellevation
Photo of the Rise User
Someone from OH, Hamilton just viewed Team Member Travel Coordinator at Allegiant
Photo of the Rise User
Someone from OH, Kent just viewed Senior Director, Program at Teaching Lab
Photo of the Rise User
Someone from OH, Toledo just viewed IT Telecom Administrator at Anduril Industries
Photo of the Rise User
Someone from OH, Kent just viewed Director, Strategic Partnerships at Teaching Lab
N
8 people applied to SAP BO Admin at NXTGIG
G
Someone from OH, Cincinnati just viewed Operations Lead - AML Refresh Ops (Global Banking) at GHR
Photo of the Rise User
Someone from OH, Akron just viewed Data Scientist II at Kaiser Permanente
Photo of the Rise User
Someone from OH, Eastlake just viewed Summer Intern at Gooch & Housego
I
Someone from OH, Perrysburg just viewed CNC Manufacturing Technician at Innovance
Photo of the Rise User
82 people applied to Security Analyst Jr at DEUNA
Photo of the Rise User
78 people applied to Cybersecurity Intern at Dewberry
Photo of the Rise User
Someone from OH, Cincinnati just viewed Senior Lifecycle Marketing Manager at SoFi
Photo of the Rise User
Someone from OH, Cincinnati just viewed Lifecycle Marketing Manager at Caribou
Photo of the Rise User
Someone from OH, Cincinnati just viewed Senior Marketing Manager at Ocorian
Photo of the Rise User
Someone from OH, Cincinnati just viewed Growth Marketing Manager at Credit Genie
Photo of the Rise User
Someone from OH, Cincinnati just viewed Director of Product Marketing - AAA Campaigns at PrizePicks
Photo of the Rise User
Someone from OH, Cincinnati just viewed Digital Marketing Analyst, Digital Properties at Darden