Home Office, Home Office, USA
1 day ago
Supply Chain Risk Manager
REQ#: RQ201506Public Trust: MBI Full 5C (T3) Requisition Type: Regular Your Impact

Own your opportunity to work alongside federal civilian agencies. Make an impact by providing services that help the government ensure the well being of U.S. citizens.

Job Description

GDIT is seeking a Supply Chain Risk Manager wit expertise in Supply Chain Risk Management (SCRM) activities and related methodologies.

Responsibilities:

Analyze organization’s supply chain, uncover inefficiencies, and establish best practicesResearch and test new hardware or software for useability and cybersecurity integrityPerform hardware and software reverse engineeringWrite analytically and present technical information to a non-technical audienceLead a multi-disciplined team effectively and efficientlyManage budgets and an organization’s resourcesMake recommendations for a company’s processes and proceduresMaintain a current understanding of supply chain logistics and research upcoming technologiesManage cloud services and automation technologies to ensure data is secure 

Required Skills and Experience:

Bachelors and 5+ yrs related experience Developing a SCRM Plan for managing supply chain risks associated with the research and development, design, manufacturing, acquisition, delivery, integration, operations and maintenance, and disposal of the CDC systems, system components or system services. Identifying and addressing weaknesses or deficiencies in the supply chain elements and processesDeveloping a Cyber SCRM Program. Including defining objectives, scope, key initiatives, team roles, lines of responsibility, RACI matrix, coordinating mechanism, methodologies for performing thorough supply risk assessments to identify vulnerabilities, threats, and potential impacts on the cyber supply chain. Conducting cyber supply chain risk assessments across the enterprise to identify potential vulnerabilities, disruptions, and threats. This includes performing due diligence on proposed, new, or existing suppliers and establishing ongoing monitoring procedures to manage supplier risks effectively.Evaluating current and potential cyber suppliers (software & hardware) to ensure they meet established risk management criteria. Conduct cyber threat assessments of suppliers to assess their reliability and risk level. This includes collecting relevant data on suppliers, software developers’ locations, capabilities, financial health, Foreign Ownership, Control or Influence (FOCI), foreign data retention, and potential risks (e.g., geopolitical events, natural disasters, cyber threats, current number of unaddressed CVEs). Developing a cyber supplier certification program to ensure suppliers and software developers meet the organization’s standards and requirements under federal regulations and guidelines, including OPM, White House Directives (Executive Order (EO) 14028), and NIST Special Publications (NIST 800-53 rev. 5).Facilitating the evaluation of the implementation of Cyber SCRM technologies and tools. Collaborate with identifying, evaluating, and implementing technology solutions and tools necessary for effective Cyber SCRM activities. This includes database systems for managing supplier information and risk analysis tools.Creating monthly communication awareness related to SCRM. Enhancing the organization's understanding and capabilities in managing supply chain risks, and promoting a culture of risk awareness across the enterprise.Establishing metrics and benchmarks for evaluating the effectiveness of the eSCRM program and provide recommendations for ongoing improvements based on performance data and emerging risks. Designing dashboards and reports to communicate supply chain risk posture to key stakeholders.Reporting all identified potential vulnerabilities, disruptions, and threats to the appropriate CDC office(s) within a 24 hour time period. Assisting in developing of counterfeit identification and detection training, verifying suppliers’ claims of conformance to security, product/component integrity, and validity/inspection of their genuine components (including hardware, software, and firmware). Covering available mitigation strategies and methods for reviewing and protecting development plans. Establishing and maintaining unique identification of CDC systems and critical system components for tracking through the supply chain.Assisting in the development and implementation of an anti-counterfeit policy and procedures that include the means to detect and prevent counterfeit components from entering the system. This includes maintaining configuration control over the system components awaiting service or repair and scanning for counterfeit system components.Must have experience working at the CDC and currently supporting the CDC Attack Surface Management program.

#GDITFedHealth
Por favor confirme su dirección de correo electrónico: Send Email