Leidos Logo

Leidos

RMF Supply Chain Risk Management Specialist (Mid-Level)

Posted 24 Days Ago
Be an Early Applicant
2 Locations
85K-154K Annually
Mid level
2 Locations
85K-154K Annually
Mid level
Conduct risk assessments for suppliers, implement security controls, evaluate vendor security practices, and ensure software security compliance within the supply chain.
The summary above was generated by AI

Leidos Digital Modernization Sector has a dynamic opportunity for a RMF Supply Chain Risk Management Specialist (Mid-Level) to work on the NOAA contract. The position can be based in either Fairmont, WV or Boulder, CO.

This position is part of the NOAA Cyber Security Center (NCSC) Security Operations Center (SOC) that executes 24x7 cybersecurity monitoring and incident response for NOAA networks.   

Risk Assessment and Mitigation:

  • Conduct comprehensive risk assessments of suppliers and vendors, evaluating their security posture against RMF guidelines to identify potential vulnerabilities within the supply chain. 
  • Develop and implement security controls based on identified risks, including data protection measures, physical security protocols, and access controls. 
  • Monitor supplier compliance with security requirements and address any deviations through corrective action plans. 
  • Help ensure that the software resulting from the SDLC meets the organization’s expectations by defining and using criteria for checking the software’s security during development
  • Ensure that all components of the environments for software development are strongly protected from internal and external threats to prevent compromises of the environments or the software being developed or maintained within them. Examples of environments for software development include development, build, test, and distribution environment
  • Help prevent unauthorized changes to code, both inadvertent and intentional, which could circumvent or negate the intended security characteristics of the software
  • Help software acquirers ensure that the software they acquire is legitimate and has not been tampered
  • Preserve software releases in order to help identify, analyze, and eliminate vulnerabilities discovered in the software after release
  • Identify and evaluate the security requirements for the software;
    • Determine what security risks the software is likely to face during operation and how the software’s design and architecture should mitigate those risks
    • Justify any cases where risk-based analysis indicates that security requirements should be relaxed or waived
    • Help identify vulnerabilities so that they can be corrected before the software is released to prevent exploitation. Using automated methods lowers the effort and resources needed to detect vulnerabilities. Human-readable code includes source code, scripts, and any other form of code that an organization deems human-readable

Vendor Management and Due Diligence:

  • Evaluate potential vendors' security practices through thorough organizationally defined processes, attestation lists, and catalogs ensuring compliance with security requirements and compliance with OMB Memorandum M-22-18, Enhancing the Security of the Software Supply Chain through Secure Software Development Practices (M-22-18) (Sept. 14,2022). 
  • Establish security requirements for vendor contracts, ensuring compliance with company and industry standards. 

Other duties as required.

Required Skills and Qualifications:

  • Strong understanding of the Risk Management Framework (RMF) , NIST SP 800-218 Secure Software Development Framework (SSDF) and its implementation within the supply chain environment. 
  • Expertise in cybersecurity principles, including data protection, network security, and access controls. 
  • Knowledge of CISCO products, Juniper, Arcsight, Windows, Linux, and different coding languages. Familiarity with GitLab, CI/CD concepts and
  • Excellent analytical and problem-solving skills to identify and address security issues. 
  • Security+ Required, certifications such as CISSP, CISM or CISA, preferred.

Clearance:

·       Must be a U.S Citizen.

·       Currently have and be able to maintain security clearance, specifically DoD/Top Secret Clearance

Original Posting Date:2024-12-19

While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:Pay Range $85,150.00 - $153,925.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Top Skills

Arcsight
Ci/Cd
Cisco
Cybersecurity
Gitlab
Juniper
Linux
Nist Sp 800-218
Risk Management Framework
Windows

Similar Jobs

Yesterday
Hybrid
Denver, CO, USA
140K-200K
Senior level
140K-200K
Senior level
Security • Software • Cybersecurity
The Senior Application Security Engineer will ensure application security by developing secure code, conducting threat modeling, and engaging in security audits and customer support.
Top Skills: Application SecurityCloud InfrastructureHTTPMulti-Threaded ApplicationsRestSecure Coding PracticesTcp/IpVulnerability Testing
Yesterday
Hybrid
5 Locations
135K-190K Annually
Senior level
135K-190K Annually
Senior level
Cloud • Information Technology • Security • Software • Cybersecurity
Consult with enterprise clients on Zero Trust Services/SASE, managing projects, creating service offerings, and leading marketing efforts for the Professional Services team.
Top Skills: APIsCdnsDdos ProtectionLoad BalancingNetworkingSaseSecurityWafZero Trust Services
Yesterday
Hybrid
6 Locations
159K-224K Annually
Senior level
159K-224K Annually
Senior level
Cloud • Information Technology • Security • Software • Cybersecurity
As a Professional Services Consultant for Zero Trust, you will implement security solutions for enterprise customers, ensuring they maximize their investment in Cloudflare technologies through planning, execution, and troubleshooting.
Top Skills: AdfsBot ManagementCasbCloudflareData Loss PreventionDlpDnsEmail SecurityFirewallsHTTPLdapMplsSAMLSaseSd-WanSsoSwgTcp/IpTlsVpnsWafsZtna

What you need to know about the Colorado Tech Scene

With a business-friendly climate and research universities like CU Boulder and Colorado State, Colorado has made a name for itself as a startup ecosystem. The state boasts a skilled workforce and high quality of life thanks to its affordable housing, vibrant cultural scene and unparalleled opportunities for outdoor recreation. Colorado is also home to the National Renewable Energy Laboratory, helping cement its status as a hub for renewable energy innovation.

Key Facts About Colorado Tech

  • Number of Tech Workers: 260,000; 8.5% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Lockheed Martin, Century Link, Comcast, BAE Systems, Level 3
  • Key Industries: Software, artificial intelligence, aerospace, e-commerce, fintech, healthtech
  • Funding Landscape: $4.9 billion in VC funding in 2024 (Pitchbook)
  • Notable Investors: Access Venture Partners, Ridgeline Ventures, Techstars, Blackhorn Ventures
  • Research Centers and Universities: Colorado School of Mines, University of Colorado Boulder, University of Denver, Colorado State University, Mesa Laboratory, Space Science Institute, National Center for Atmospheric Research, National Renewable Energy Laboratory, Gottlieb Institute

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account