CrawlJobs Logo

Mission Assurance Analyst

barbaricum.com Logo

Barbaricum

Location Icon

Location:
United States , The Pentagon, VA

Category Icon
Category:

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Barbaricum is seeking a Mission Analyst to support execution of policies, plans, and strategies for Headquarters Air Force Critical Asset Risk Management (CARM) office. CARM performs the basic functions of Mission Assurance (MA), the defense critical infrastructure (DCI), and Risk Management requirements for the Air Force including identifying, assessing, prioritizing, and overseeing risk management actions for the most critical USAF and Department of Defense (DoD) assets in accordance with Department of Defense Instruction (DODI) 3020.45. This individual will be primarily responsible for conducting the asset identification and assessment portions of the Mission Assurance construct. This includes recommending nomination or denomination of assets based on mission criticality, updating asset information in MA systems of record, and preparing for MA Assessments. This person will prepare briefings, write or contribute to technical analysis white papers, and conduct routine analysis of Air Force assets to support Headquarters Air Force CARM activities.

Job Responsibility:

  • Prepare Mission Analysis Briefings for Air Force nominated Mission Assurance Assessments
  • Maintain entries for Air Force owned assets in Mission Assurance systems of record
  • Understand and execute DoD and Joint Staff Mission Assurance policy
  • Contribute to annual Air Force TCA validation
  • Conduct dependency analysis of Air Force owned assets
  • Write and staff Assessment Focus Statements for Air Force led Mission Assurance Assessments
  • Participate in Pre-Assessment Site Surveys in support of mission Assurance Assessments at locations across the globe

Requirements:

  • Active DoD TS/SCI Clearance
  • Proficiency with Microsoft Office
  • Excellent oral and written communication skills
  • Ability to travel CONUS or OCONUS approximately one week per quarter

Nice to have:

  • Experience working on large G, J, or A staffs
  • Candidates with experience working at MAJCOM or numbered Air Force Staffs in requirements or plans and programs are highly desired
  • Mission Analyst experience with Mission Assurance databases and Mission Assurance Risk Management System (MARMS) applications
  • Experience conducting Mission Assurance or other vulnerability/risk assessments
  • Relevant experience in a Mission Assurance related discipline including Force Protection, Civil Engineering, Emergency Management, Operations Research or Cyber Security
  • Experience conducting analysis and presenting findings in written and oral briefing formats

Additional Information:

Job Posted:
December 23, 2025

Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Mission Assurance Analyst

New

Senior Cybersecurity Analyst Engineer

Senior Cybersecurity Analyst/Engineer to join our prime contract supporting Gold...
Location
Location
United States , Huntsville
Salary
Salary:
Not provided
astrion.us Logo
Astrion
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 15+ years of cybersecurity experience supporting USSF, DoD, or related federal organizations
  • BA or BS degree
  • Active DoD TS/SCI clearance (with current investigation)
  • CompTIA Security+ or equivalent DoD 8570/8140 IAT/IAM certification
  • Hands-on experience with eMASS
  • Familiarity with Risk Management Framework (RMF) protocols
  • Knowledge of USSF A&A procedures
Job Responsibility
Job Responsibility
  • Support A&A activities and provide cybersecurity engineering expertise for enterprise mission systems
  • Develop, update, and manage Enterprise Mission Assurance Support Service (eMASS) entries and coordinate A&A packages in accordance with DoDI 8510.01 (RMF)
  • Maintain and report on C&A schedules, package status, and system registrations in ITIPS (formerly EITDR) in compliance with FISMA
  • Review and refine certification policies, procedures, and reports for new and evolving cyber system requirements
  • Conduct research and analysis to assess the impact of new DoD, USSF, DIA, and DISA cybersecurity directives
  • Support Vulnerability Management System (VMS) processes by documenting, tracking, and closing compliance findings
  • Contribute to Security Test & Evaluation (ST&E) efforts, penetration testing, and validation of cybersecurity controls
  • Revalidate cyber and IA controls for accredited systems and recommend improvements to strengthen mission assurance
  • Assess policy changes from higher headquarters and determine impact on current mission system security posture
What we offer
What we offer
  • Competitive salaries
  • Continuing education assistance
  • Professional development
  • Multiple healthcare benefits package options
  • 401K with employer matching
  • Competitive time off policy along with a federally recognized holiday schedule
Read More
Arrow Right

Target Analyst Reporter III

We are seeking a highly skilled Target Analyst Reporter III to join our team. Th...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
wrench.io Logo
Wrench Technology
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Five (5) years of professional experience supporting a cryptologic mission in language or signals analyst and a Bachelor’s Degree
  • Security Clearance Required
Job Responsibility
Job Responsibility
  • Researching, analyzing and reporting intelligence via appropriate reporting vehicles, in response to Intelligence Community requirements and in accordance with missions of Signals Intelligence, Information Assurance and Computer Network Operations
  • Aiding in the execution of collection-tasking strategies
  • Offering operational support to users during upgrades/installation of new collection systems
  • Supporting the review of collection priorities submitted by the Analysis and Production organization
  • Fulltime
Read More
Arrow Right

Senior Cybersecurity Specialist

Seeking a Senior Cybersecurity Specialist that is able to work with a dynamic te...
Location
Location
United States , Boston
Salary
Salary:
Not provided
mcdean.com Logo
M.C. Dean, Inc
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Top Secret clearance with the ability to obtain
  • U.S. Citizenship
  • Bachelor’s Degree in Computer Science, Engineering, Information Technology, or Cybersecurity Discipline preferred
  • 12+ years of demonstrated experience in Information Security
  • Good working knowledge of both DoD and Federal Government Cybersecurity/Information Assurance Security policies and procedures
  • 9+ years of applicable experience with a Master's Degree
  • 15+ years of applicable experience with an Associate's Degree
  • Demonstrated experience leading Cybersecurity Teams
  • Demonstrated experience with combined Risk Management Framework (RMF) and/or other system authorization and accreditation processes and NIST 800-53 controls
  • Demonstrated experience accrediting systems using Enterprise Mission Assurance Support Service (eMASS)/Xacta or similar, McAfee Host Based Security System (HBSS) or similar, and Nessus
Job Responsibility
Job Responsibility
  • Manage a team of engineers, analysts, and cybersecurity specialists
  • Be the contract Subject Matter Expert (SME) all matters related to Cybersecurity and the Risk Management Framework (RMF), and cyber compliance/tools (e.g., eMASS/XACTA, Nessus, HBSS, Splunk, etc.)
  • Drive team awareness of newly emerging Department of Defense cyber requirements
  • Bring forward suggestions on potential new cybersecurity related tools that will drive automation of team processes
  • Ensure Risk Assessments, Exemption/Exception requests and RMF Packages meet compliance
  • Ensure team is monitoring, reporting, and assessing Cyber compliance for all Operations and Infrastructure on schedule and in accordance with government policies
  • Ensure team maintenance, monitoring, reporting, and assessment of Cyber compliance on all security tools and technology
  • Ensure team is monitoring, reporting, and assessment of Cyber internal and external policy compliance
  • Work to mitigate risk across security system’s infrastructure
  • Interface daily with program management, operations, and engineers leads
What we offer
What we offer
  • Medical, dental, vision, life, and disability insurance
  • Paid time off
  • Tuition reimbursement
  • 401k Retirement Plan
  • Military Reserve pay offset
  • Paid maternity leave
  • Professional and technical training programs
  • Leadership training
  • Fulltime
Read More
Arrow Right
New

Cyber Information Assurance Analyst SME

The Cyber Information Assurance Analyst SME provides IT support services for the...
Location
Location
United States , Albany, GA
Salary
Salary:
Not provided
chickasaw.com Logo
Chickasaw Nation Industries, Inc (CNI)
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Secret Clearance is required and must be maintained for employment
  • Must be eligible for an IT-II upon assignment
  • Tenable Certified NESSUS Auditor required and must maintain CSSP Auditor Certification
  • IAM III and IAT II level certification is required
  • Proven proficiency performing CCRI / vulnerability assessment / penetration testing on networks, databases, computer applications and IT frameworks
  • Seven (7) years IT experience
  • Five (5) years IA experience
  • Two (2) years of experience with DOD Vulnerability Management System
  • Command Cyber Readiness Inspection certification in at least one of the following areas: Retina scan analysis
  • Operating Systems (Windows, Unix)
Job Responsibility
Job Responsibility
  • Independently performs complex security analysis of classified and unclassified applications, systems and enclaves for compliance with security requirements
  • Performs Command Cyber Readiness Inspections and cybersecurity vulnerability evaluations
  • Uses a variety of security techniques, technologies, and tools to evaluate security posture in highly complex computer systems and networks
  • Performs vulnerability and risk analysis, and participate in a variety of computer security penetration studies
  • Analyzes and defines security requirements for computer and networking systems, to include mainframes, workstations, and personal computers
  • Recommends solutions to meet security requirements
  • Gathers and organizes technical information about an organization's mission goals and needs, and makes recommendations to improve existing security posture
  • Provide enterprise-wide technical analysis and direction for problem definition, analysis and remediation for complex systems and enclaves
  • Provides workable recommendations and advice to client executive management on system improvements, optimization and maintenance in the following areas: Information Systems Architecture, Automation, Telecommunications, Networking, Communication Protocols, Application Software, Electronic Email, VOIP and VTC
  • Competent to work at the highest level of all phases of information systems auditing
What we offer
What we offer
  • Medical
  • Dental
  • Vision
  • 401(k)
  • Family Planning/Fertility Assistance
  • STD/LTD/Basic Life/AD&D
  • Legal-Aid Program
  • Employee Assistance Program (EAP)
  • Paid Time Off (PTO) – (11) Federal Holidays
  • Training and Development Opportunities
  • Fulltime
Read More
Arrow Right

Cyber Information Assurance Analyst SME

The Cyber Information Assurance Analyst SME provides IT support services for the...
Location
Location
United States , Albany
Salary
Salary:
Not provided
chickasaw.com Logo
Chickasaw Nation Industries, Inc (CNI)
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Secret Clearance is required and must be maintained for employment
  • Must be eligible for an IT-II upon assignment
  • Tenable Certified NESSUS Auditor required and must maintain CSSP Auditor Certification
  • IAM III and IAT II level certification is required
  • Proven proficiency performing CCRI / vulnerability assessment / penetration testing on networks, databases, computer applications and IT frameworks
  • Seven (7) years IT experience
  • Five (5) years IA experience
  • Two (2) years of experience with DOD Vulnerability Management System
  • Command Cyber Readiness Inspection certification in at least one of the following areas: Retina scan analysis
  • Operating Systems (Windows, Unix)
Job Responsibility
Job Responsibility
  • Independently performs complex security analysis of classified and unclassified applications, systems and enclaves for compliance with security requirements
  • Performs Command Cyber Readiness Inspections and cybersecurity vulnerability evaluations
  • Uses a variety of security techniques, technologies, and tools to evaluate security posture in highly complex computer systems and networks
  • Performs vulnerability and risk analysis, and participate in a variety of computer security penetration studies
  • Analyzes and defines security requirements for computer and networking systems, to include mainframes, workstations, and personal computers
  • Recommends solutions to meet security requirements
  • Gathers and organizes technical information about an organization's mission goals and needs, and makes recommendations to improve existing security posture
  • Provide enterprise-wide technical analysis and direction for problem definition, analysis and remediation for complex systems and enclaves
  • Provides workable recommendations and advice to client executive management on system improvements, optimization and maintenance in the following areas: Information Systems Architecture, Automation, Telecommunications, Networking, Communication Protocols, Application Software, Electronic Email, VOIP and VTC
  • Competent to work at the highest level of all phases of information systems auditing
What we offer
What we offer
  • Medical
  • Dental
  • Vision
  • 401(k)
  • Family Planning/Fertility Assistance
  • STD/LTD/Basic Life/AD&D
  • Legal-Aid Program
  • Employee Assistance Program (EAP)
  • Paid Time Off (PTO) – (11) Federal Holidays
  • Training and Development Opportunities
  • Fulltime
Read More
Arrow Right

Exploitation Analyst

Hoplite Solutions is seeking experienced Level 3 and Level 4 Exploitation Analys...
Location
Location
United States
Salary
Salary:
Not provided
hoplitesolutions.com Logo
Hoplite Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement
  • In some cases, foreign language proficiency may also be used to satisfy experience requirements
  • recent Interagency language Roundtable (ILR) scores are required to substantiate your proficiency level
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees: Level 3: 4 years’ applicable experience with a PhD, OR 6 years’ applicable experience with a master’s degree, OR 8 years’ applicable experience with a bachelor’s degree, OR 10 years’ applicable experience with an associate degree
  • Level 4: 7 years’ applicable experience with a PhD, OR 9 years’ applicable experience with a master’s degree, OR 11 years’ applicable experience with a bachelor’s degree, OR 13 years’ applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
What we offer
What we offer
  • 7% employer 401k contribution
  • fully paid healthcare for our employees
  • outstanding training benefits
  • company funded life insurance and short-term disability insurance
  • Fulltime
Read More
Arrow Right

Digital Network Exploitation Analyst

Hoplite Solutions is seeking Digital Network Exploitation Analysts (DNEAs) level...
Location
Location
United States
Salary
Salary:
Not provided
hoplitesolutions.com Logo
Hoplite Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Relevant experience in computer or information systems design/development/analysis roles
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered towards the relevant experience requirement
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees: Level 3: 4 years’ applicable experience with a PhD, OR 6 years’ applicable experience with a master’s degree, OR 8 years’ applicable experience with a bachelor’s degree, OR 10 years’ applicable experience with an associate degree
  • Level 4: 7 years’ applicable experience with a PhD, OR 9 years’ applicable experience with a master’s degree, OR 11 years’ applicable experience with a bachelor’s degree, OR 13 years’ applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans
  • Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network
  • Be involved in developing new tradecraft needed to perform this analysis as technologies evolve
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
What we offer
What we offer
  • 7% employer 401k contribution
  • Fully paid healthcare for our employees
  • Outstanding training benefits
  • Company funded life insurance
  • Company funded short-term disability insurance
  • Fulltime
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Fort Gordon
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees (Level 1: 2 years applicable experience with a bachelor's degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a master's degree, OR 5 years applicable experience with a bachelor's degree, OR 7 years applicable experience with an associate degree
  • Level 3: 4 years applicable experience with a PhD, OR 6 years applicable experience with a master's degree, OR 8 years applicable experience with a bachelor's degree, OR 10 years applicable experience with an associate degree
  • Level 4: 7 years applicable experience with a PhD, OR 9 years applicable experience with a master's degree, OR 11 years applicable experience with a bachelor's degree, OR 13 years applicable experience with an associate degree)
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associate's degree
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right