The contractor shall provide Functional Mission Analysis-Cyber assistance to identify weapon system’s critical information technology architecture and supporting infrastructure that aids in the warfighting mission. Contractor shall perform Information Security Analyst functions as follow:
- Contractor personnel supporting this effort shall possess a fundamental understanding of DoD mission assurance concepts/principles and how they relate to the USAF mission.
- Investigate a diverse collection of network activities in cyberspace to determine essential Mission Relevant Terrain Cyber (MRT-C) support designed for command, control, processes, and systems.
- Develop a strategy to identify, evaluate, and minimize risks in the local cyberspace environment that are considered crucial for mission success.
- Create and implement strategies and techniques to merge and display relevant MRT-C, based on essential systems and network services.
- Identify and analyze trends to define MRT-C requirements and provide guidance and alignment services.
- Assist with FMA-C, identifying, mapping, and developing a defense plan to safeguard MRT-C.
- Establish databases to monitor systems, design and revise user boundaries, and create indexing to make searches easier.
- Utilize classified and unclassified networks and information portals to create support and information distribution plans for mission activities.
- Review and provide recommendations for establishing new or revised policies, procedures, objectives, and organization design for the staff, as necessary.
- Coordinate with local/base SMEs to resolve events and/or incidents & brief supporting recommendations and Courses of Actions.
- Define and perform vulnerability assessments leveraging threat analysis to scope and prioritize efforts.
- Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings)
- Coordinate with enterprise-wide cyber defense staff to validate network alerts.
- Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
- Perform cyber defense trend analysis and reporting.
- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
- Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.