Senior Cyber Enhanced Assessment (cea) Assessor II - Tucson, Az

RTX RTX · Aerospace · tucson, AZ +1 · Digital Technology

This role supports cybersecurity assessment activities, focusing on compliance validation, trend analysis, and mentoring. It involves developing and sustaining documentation and tools, conducting enhanced assessments, and providing support for self-inspection and continuous monitoring efforts. The position also includes supporting the lifecycle of automated tools and scripts.

What you'd actually do

  1. Assists with the development and sustainment of ConMon documentation (e.g., process, instruction, training) and tools. Identifies challenges and suggests opportunities for the CEA Program.
  2. Conducts enhanced assessments. Prepares reports to identify trends and significant discoveries and assists with root cause analysis. Assists in the development of implementation plans to mitigate the risk.
  3. Provides Cybersecurity support for Self-Inspection events, as needed.
  4. Provides training to assessment team members on CEA process, tool usage and best practices.
  5. Support the lifecycle of automated tools and scripts (primarily C#, PowerShell, BASH, and SPL), including requirements, design, development, testing, deployment, documentation, and sustainment.

Skills

Required

  • IAM Level I certification (Security+ or other)
  • Experience with C# (.NET 8+), PowerShell, BASH, and/or Splunk SPL for developing or sustaining operational tooling in security contexts.
  • Experience with various information system security tools that address vulnerability analysis and mitigation. These include Splunk, Forcepoint, Ivanti, Tenable, ACAS, HBSS, etc.
  • Cybersecurity, systems security, or system hardening
  • Security Control Accessor (SCA) with the government or military
  • Information Technology
  • Experience with network security and/or systems security, which includes any of the following: architecture, topology, protocols, components, and/or principles
  • Experience with configuring and/or auditing operating systems
  • Compliance-based auditing using the Risk Management Framework (RMF), Defense Counterintelligence and Security Agency (DCSA) Assessment and Authorization Guide (DAAG), Joint SAP Implementation Guide (JSIG), National Industrial Security Program Operating Manual (NISPOM), and/or non-defense regulations such as FAA, Payment Card Industry (PCI), ISO 9001 Quality Management standards, or HIPPA
  • Experience working with and/or supporting computer technologies (such as databases, operating systems, computer network hardware, protocols, security methodologies, software programs, troubleshooting hardware or electronics)

Nice to have

  • Experienced in C# development and code review within a professional environment, including familiarity with WPF application development and the MVVM architectural pattern.
  • Experience with code repository management, including version control concepts, push/pull mechanics, and coordinated team-based development using tools such as Git, Azure DevOps, or GitLab.
  • Experienced in PowerShell, BASH, and Splunk SPL for developing or sustaining operational tooling.
  • Familiarity with implementation of Government directives and policies derived from NIST, CNSSI, DoD, or other Government Regulatory compliance standards within a professional industry.
  • Experience providing technical security consultation for complex, cross-domain, heterogeneous classified networked environments in collaboration with internal/external Customers, Information Technology (IT).
  • Familiarity with large multi-facility networks including complex components, including Windows and Linux environments.
  • Experience interpreting, implementing, and assessing DISA STIGs.
  • Experience with continuous monitoring and Plans of Actions and Milestones (POA&M)

What the JD emphasized

  • Active and transferable U.S. government issued security clearance is required prior to start date
  • U.S. citizenship is required
  • Active and existing security clearance required on day 1
  • Experience with C# (.NET 8+), PowerShell, BASH, and/or Splunk SPL for developing or sustaining operational tooling in security contexts.
  • Compliance-based auditing using the Risk Management Framework (RMF), Defense Counterintelligence and Security Agency (DCSA) Assessment and Authorization Guide (DAAG), Joint SAP Implementation Guide (JSIG), National Industrial Security Program Operating Manual (NISPOM), and/or non-defense regulations such as FAA, Payment Card Industry (PCI), ISO 9001 Quality Management standards, or HIPPA