Who We're Looking For (Position Overview : )
Spry Methods is actively seeking an IT Security Analyst to join our team in Herndon, VA.
Security Analyst (SA) will assist with the creation, update, and maintenance of FedRAMP required security documentation, associated artifacts, and Continuous Monitoring (CONMON) requirements such as the Plan of Action and Milestones (POAM) and assisting the Cloud Operations team with the identification and corrective actions associated with known vulnerabilities. Additionally, the SA provides advisement to stakeholders on changing regulatory, government and Cloud / FedRAMP policies, procedures, agreements, etc., including risk assessment, business impact analysis, system categorization, security authorization and accreditation / certification activities (A&A), security control inheritance from various providers, and other artifacts needed to validate SAP NS2 control compliance.
What Your Day-To-Day Looks Like (Position Responsibilities) :
- Understand / document information system specifications and security controls, including logical and physical diagrams, connectivity, communication, and data flow diagrams, both internal and external to the system
- Advise stakeholders on multiple courses of action in an environment with changing unconfirmed policy, e.g., NIST RMF and DISA SRG
- Document multiple courses of action and identify risk mitigation recommendations in accordance with FedRAMP requirements, SAP NS2 policy, procedures, and best practices, with associated benefits / drawbacks to each
- Apply enterprise security frameworks and capabilities, such as FISMA, NIST SP 800, etc. towards existing initiatives such as cloud environments
- Develop / update policies and procedures to implement FedRAMP compliance as well as compliant with NIST 800-171 security requirements and other DFAR clauses
- Understand enterprise operating environments, including security posture, application environment, and associated security controls
- Demonstrate familiarity with current FedRAMP, DOD and NIST Security controls and technologies, including vulnerability management capabilities
- Identify and assess Cloud System state, including vulnerabilities, RMF package stataccreditation model, PPS compliance, and patching / CSVA mechanisms
What You Need to Succeed (Minimum Requirements) :
Bachelors degree in Computer Information Systems or Math / SciencesDemonstrated knowledge and the ability to analyze systems for Cybersecurity complianceAbility to work in fast-paced, team-oriented environmentKnowledge of various security scanning tools (Such as NESSUS, Splunk or Application scanning)Knowledge of Federal and DoD policies and risk assessment methodologies, including FedRAMPExperience in writing or executing system security documentation, authorization to operate packages, POA&Ms, and policiesExperience in reviewing / editing / writing technical documentsPresentation And Public Speaking Skills RequiredKnowledge of DISA STIGs and SRGs, Committee for National Security Systems Instructions and NIST Risk Management FrameworkKnowledge and understanding of systems and networking technologies and conceptsAbility to interpret and assess network diagrams and drawings using VisioFamiliarity with Testing, Development, Staging, and pre-production environment requiring cyber security supportKnowledge of Privacy Act