The Security Control Assessor (SCA) will conduct and document a comprehensive assessment of the management operational and technical security controls employed within or inherited by an information system. The SCA will determine the overall control effectiveness through documentation review inspections testing and interviews. The role will provide an assessment of the severity of weakness or deficiencies and recommend corrective actions to address identified vulnerabilities. The SCA will provide initial mitigation of Cybersecurity incidents support incident investigations and closure of the incidents. The position will provide assessment of proposed technology (hardware software and firmware) for Cybersecurity vulnerabilities.
Responsibilities
- Assessment Package Feedback which focuses on the documentation submitted to support the various steps of Risk Management Framework (RMF). Recommend a format for this document for government approval.
- Security Assessment Report which focuses on the assessment of an information system in support of the authorization determination. Shall provide a draft report using the government provided template; may recommend format changes for government consideration.
- Periodic Cybersecurity Assessment Report or Security Compliance Report which focuses on the assessment of a Cybersecurity program at a location. Shall provide a draft report using the government provided template; may recommend format changes for government consideration
- Cybersecurity Incident Reports which focus on documenting Cybersecurity incidents. Shall provide a draft report using the government provided template; may recommend format changes for government consideration.
- Technical Assessment of Hardware Software or Firmware. Shall document the technical assessment addressing Cybersecurity vulnerabilities via a government agreed format such as a Help Desk ticket application electronic mail memorandum etc.
- Develop an annual compilation of findings and observations based upon the Security Assessment Reports and Periodic Cybersecurity Assessment Reports or Security Compliance Reports based upon fiscal year assessments. The format shall be recommended for government approval. The compilation shall be void of system names system identification numbers government or contractor locations and individual names.
- Draft and / or preliminary documents shall be presented in one of the following electronic formats : Microsoft Office version 2007 compatible (.docx .xlsx or .pptx) or the standard Portable Document Format (PDF) format. Final and / or approved format shall be determined by the government; may recommend additional formats.
- Incumbent travel requirements are approximately 30% annually to support critical business needs. Travel location are CONUS and some OCONUS locations.
Requirements
US Citizenship; Active TS / SCI Clearance with ability to obtain and maintain a CI PolyBachelors Degree in Information Technology Cybersecurity Computer Science Information Systems Data Science or Software Engineering from an ABET accredited or NCAE designated institution; OR Certifications : Certified in Governance Risk and Compliance (CGRC); or CompTIA Security ce; or CompTIA Cloud ; or CompTIA PenTest ; or CompTIA SecurityX (formerly CASP)4 or more years of experience in the validation of security configuration of operating systems2 or more years of experience applying Risk Management Framework (RMF) as described in the National Institute of Standards and Technology Special PublicationsMeet the Cyber IT / Cybersecurity Workforce (CSWF) Security Control Assessor (612); Intermediate Level for SECNAV M-5239.2 complianceTravel approximately 30% annually. Travel location are CONUS and some OCONUS locationsDesired Skills
Strongly desired experience with application of the Defense Information Systems Agency (DISA) Security Technical Implementation GuidesOperating System / Computing Environment certificate for Windows Server 2012 or newer UNIX (Linux (Red Hat) Solaris)Experience with vulnerability scannersExperience with Cloud technologiesDocumented (certificate) RMF training provided by the Intelligence Community or DoD SAP communityExperience with assessing security relevant applicationsExperience as a System Administrator Information System Security Manager or Information System Security OfficerExperience applying the requirements of the DoD Joint Special Access Program Implementation Guide (JSIG) to information systems or Cybersecurity programsA cyber credential at the Master proficiency level for specialty area Securely Provision Risk Management as outlined in SECNAV M-5239.2Experience with Cross Domain Solutions (CDS)About Us
For more than 20 years NewGen Technologies has solved our clients toughest IT challenges with integrity security and outstanding service by delivering both technology and talent. We have helped secure borders have used artificial intelligence (AI) to fight terror aided the identification of criminals and have helped to prevent crime through the introduction of team of Highly Cleared Specialists have hard-to-find skills and expertise in a wide spectrum of technologies to provide solutions that transform business processes and solve problems of national significance. #CJ
Key Skills
Intelligence,Information Technology Sales,Accounts,Auto Parts,Data Analysis
Employment Type : Full Time
Experience : years
Vacancy : 1