Are you interested in using your skills to help shape the Cyber, Security, & Intel space? If so, look no further. We are seeking a Security Controls Assessor to join our team of passionate individuals. In this role you will support challenging, mission-critical projects that make a direct impact on the nation's security and intelligence mission. Work with a great team in a collaborative environment to influence and impact RMF life cycle. Contract hours are 6 am to 6pm and core hours are 10am to 2pm Monday through Friday.
This position is contingent upon contract award
Responsibilities:
Conduct verification and validation for security compliance of low and moderately complex information systems, products, and components. Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures.
Provide identification of non-compliance of security requirements and possible mitigations to requirements that are not in compliance.
Conduct on-site evaluations.
Validate the security requirements of the information system.
Verify and validate that the system meets the security requirements.
Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system.
Provide process improvement recommendations.
Draft standards and guidelines for usage.
Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures
Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system
#divergent
Five (5) years experience in security, systems engineering or system assessment to include recent experience within the last three (3) years in the following areas:
Cybersecurity principles and technology, including access/control, authorization, identification and authentication, PKI, network and enterprise security architecture is required.
Bachelor's degree in Computer Science or Information Technology Engineering or related field of study is required.
In lieu of a Bachelor's degree, four (4) additional years in security or systems engineering may be substituted.
DoD 8570 compliance with IAT II is required.
Clearance Required: