Cybersecurity Assessment and Authorization Subject Matter Expert (SME)

Other Jobs To Apply

<span style="font-size:11pt;"><span style="line-height:107%;"><span style="font-family:Aptos, sans-serif;"><b><span style="font-size:12pt;"><span style="line-height:107%;"><span style="font-family:Arial, sans-serif;">Title: </span></span></span></b><span style="font-size:12pt;"><span style="line-height:107%;"><span style="font-family:Arial, sans-serif;">Cyberscurity Assessment and Authorization Subject Matter Expert (SME)<br><b>Location: </b>Remote<br><strong>Clearance Required:</strong> DoD Secret clearance<br><b>Position Type: </b>Full-Time<b> <br><br>About VivSoft:</b><br>At VivSoft, we aim to solve complex federal problems using emerging and open technologies in a collaborative and rewarding environment. VivSoft is a diverse team of strategists, engineers, designers, and creators experienced in building high performance effective softwares, with impactful organizational design and organizational dynamics for software delivery. We build secure Software Factories based on DoD reference designs and NIST Frameworks for Cloud and DevSecOps. These factories deliver AI/ML Applications, Data Science Platforms, Blockchain and Microservices for DoD, Healthcare and Civilian Agencies</span></span></span></span></span></span><br><br><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><b><span style="font-family:Arial, sans-serif;">Job Summary</span></b></span></span><br><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">The Defense Logistics Agency (DLA) is seeking a highly experienced Cybersecurity Assessment & Authorization Subject Matter Expert (SME) to support the sustainment and security of the Contingency and Adaptive Planning Software Integration System (CAPSIS). CAPSIS is a mission‑critical, SAS‑based analytics platform operating on the classified SIPRNet, used to forecast consumable supply requirements and analyze supply chain readiness for U.S. military contingency operations.</span></span></span><br><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">The selected individual will serve as the technical authority for cybersecurity compliance, assessment, and authorization, ensuring CAPSIS remains fully compliant with DoD Information Assurance (IA), RMF, DISA STIG, and CCRI requirements throughout its lifecycle. This role requires deep technical expertise, independent judgment, and close collaboration with DLA IA, infrastructure, and cybersecurity teams.</span></span></span><br><br><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><b><span style="font-family:Arial, sans-serif;">Key Responsibilities:</span></b></span></span><ul><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Serve as the Cybersecurity Assessment & Authorization Subject Matter Expert (SME) for the CAPSIS system</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Lead and support CCRI inspections, vulnerability assessments, and penetration testing</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Implement and validate DoD IA controls across the system lifecycle</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Ensure compliance with RMF, SCAP, DISA STIGs, and DoD cybersecurity regulations</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Analyze and resolve highly complex cybersecurity issues on classified systems</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Recommend and evaluate cybersecurity tools, architectures, and mitigations</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Develop product‑specific STIGs aligned with DISA SRGs</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Support secure configuration of networks, operating systems, databases, and web services</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Collaborate with DLA IA teams, CERT, program managers, and infrastructure teams</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Contribute to knowledge transfer to enable long‑term DLA system sustainment</span></span></span></span></li></ul><br><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><b><span style="font-family:Arial, sans-serif;">Required Skills:</span></b></span></span><ul><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Must possess an active DoD SECRET Clearance</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">7+ years of IT experience with 5+ years in cybersecurity</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Hands‑on experience with CCRI, vulnerability assessments, and penetration testing</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Strong expertise in RMF, SCAP, DISA STIGs, and DoD security policies.</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Advanced knowledge of network security (boundary and internal defense), Windows and Unix/Linux operating systems, enterprise databases (SQL Server and Oracle), web services (IIS, Apache, proxy servers), and enterprise email systems such as Microsoft Exchange.</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Proficiency with cybersecurity tools, including NESSUS, VULNERATOR, and SCCM, as well as wireless and phishing assessment tools, and USB detection and physical security methodologies.</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Strong analytical, problem‑solving, and communication skills</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Ability to work independently under consultative direction</span></span></span></span></li></ul><br><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><b><span style="font-family:Arial, sans-serif;">Required Certifications:</span></b></span></span><ul><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">CCRI Certification in one or more of the following areas: </span></span></span></span></li></ul><ul><li style="margin-left:80px;"><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Retina scan analysis</span></span></span></li><li style="margin-left:80px;"><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Operating systems security</span></span></span></li><li style="margin-left:80px;"><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Boundary defense (routers, firewalls)</span></span></span></li><li style="margin-left:80px;"><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Internal defense (switching technologies)</span></span></span></li><li style="margin-left:80px;"><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">DNS, HBSS, and wireless communications</span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">DISA FSO–Certified CCRI Team Lead</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Penetration Testing Certification (one or more): CEH, GPEN, LPT, or CEPT</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Tenable Certified NESSUS Auditor</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Additional relevant certification from a nationally recognized technical authority</span></span></span></span></li></ul><br><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><b><span style="font-family:Arial, sans-serif;">Preferred Skills:</span></b></span></span><ul><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Prior experience supporting DLA or DoD classified systems</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Experience securing SAS platforms or enterprise analytics environments</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Familiarity with classified cloud or hybrid cloud environments</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Experience supporting logistics, supply chain, or contingency planning systems</span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Expertise in enterprise cybersecurity strategy and long‑term risk mitigation</span></span></span></span></li></ul><br><span style="font-size:12pt;"><span style="font-family:'Times New Roman', serif;"><b><span style="font-family:Arial, sans-serif;">Benefits:</span></b></span></span><ul><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Comprehensive Medical, Dental, and Vision Plans (Healthcare benefits are 100% employer-paid for employees only) </span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Life Insurance </span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Paid Time Off (Flexible/Combined PTO, Bereavement Leave, 11 Company Paid Holidays) </span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">401K Retirement Plan with employer match </span></span></span></span></li><li><span style="font-size:12pt;"><span><span style="font-family:'Times New Roman', serif;"><span style="font-family:Arial, sans-serif;">Professional Development Training Reimbursement.</span></span></span></span></li></ul>

Back to blog

Common Interview Questions And Answers

1. HOW DO YOU PLAN YOUR DAY?

This is what this question poses: When do you focus and start working seriously? What are the hours you work optimally? Are you a night owl? A morning bird? Remote teams can be made up of people working on different shifts and around the world, so you won't necessarily be stuck in the 9-5 schedule if it's not for you...

2. HOW DO YOU USE THE DIFFERENT COMMUNICATION TOOLS IN DIFFERENT SITUATIONS?

When you're working on a remote team, there's no way to chat in the hallway between meetings or catch up on the latest project during an office carpool. Therefore, virtual communication will be absolutely essential to get your work done...

3. WHAT IS "WORKING REMOTE" REALLY FOR YOU?

Many people want to work remotely because of the flexibility it allows. You can work anywhere and at any time of the day...

4. WHAT DO YOU NEED IN YOUR PHYSICAL WORKSPACE TO SUCCEED IN YOUR WORK?

With this question, companies are looking to see what equipment they may need to provide you with and to verify how aware you are of what remote working could mean for you physically and logistically...

5. HOW DO YOU PROCESS INFORMATION?

Several years ago, I was working in a team to plan a big event. My supervisor made us all work as a team before the big day. One of our activities has been to find out how each of us processes information...

6. HOW DO YOU MANAGE THE CALENDAR AND THE PROGRAM? WHICH APPLICATIONS / SYSTEM DO YOU USE?

Or you may receive even more specific questions, such as: What's on your calendar? Do you plan blocks of time to do certain types of work? Do you have an open calendar that everyone can see?...

7. HOW DO YOU ORGANIZE FILES, LINKS, AND TABS ON YOUR COMPUTER?

Just like your schedule, how you track files and other information is very important. After all, everything is digital!...

8. HOW TO PRIORITIZE WORK?

The day I watched Marie Forleo's film separating the important from the urgent, my life changed. Not all remote jobs start fast, but most of them are...

9. HOW DO YOU PREPARE FOR A MEETING AND PREPARE A MEETING? WHAT DO YOU SEE HAPPENING DURING THE MEETING?

Just as communication is essential when working remotely, so is organization. Because you won't have those opportunities in the elevator or a casual conversation in the lunchroom, you should take advantage of the little time you have in a video or phone conference...

10. HOW DO YOU USE TECHNOLOGY ON A DAILY BASIS, IN YOUR WORK AND FOR YOUR PLEASURE?

This is a great question because it shows your comfort level with technology, which is very important for a remote worker because you will be working with technology over time...