Security Control Assessor, I Internet & Ecommerce - Colorado Springs, CO at Geebo

Security Control Assessor, I

Company Name:
ClearedPath
The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer's area of responsibility.
Duties may include: (may be modified with concurrence of the Contracting Officer and contractor Program Manager)
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
Perform analysis of network security, based upon the DCID 6/3, DITSCAP, DIACAP, and NISPOM Chapter 8 certification and accreditation process; advise customer on IT certification and accreditation issues
Perform risk assessments and make recommendations to customers
Advise government program managers on security testing methodologies and processes
Evaluate certification documentation and provide written recommendations for accreditation to government PM's
Periodically review system security to accommodate changes to policy or technology
Evaluate IT threats and vulnerabilities to determine whether additional safeguards are needed
Advise the government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system
Ensure that certification is accomplished for each information system
Develop, implement, provide guidance, and enforce AIS security policies and procedures
Ensure that all ISSOs, network administrators, and other AIS personnel receive the necessary technical and security training to carry out their duties
Develop, review, endorse, and recommend action by the designated approval authority (DAA) of system certification documentation
Ensure approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output
Conduct certification tests that include verification that the features and assurances required for each protection level fare functional
Maintain a repository for all system certification/accreditation documentation and modifications
Coordinate AIS security inspections, tests, and reviews
Develop policies and procedures for responding to security incidents, and for investigating and reporting security violations and incidents
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
Ensure that data ownership and responsibilities are established for each AIS, to include accountability, access rights, and special handling requirements
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local AIS security training.
Ensure that security testing and evaluations are completed and documented
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
Assess changes in the system, its environment, and operational needs that could affect the accreditation
Conduct periodic testing of the security posture of the AIS
Ensure configuration management (CM) for security-relevant AIS software, hardware, and firmware are properly documented.
At the conclusion of each security assessment activity, prepare the final Security Assessment Report (SAR) containing the results and findings from the assessment
Initiate a POA&M; with identified weaknesses and suspense dates for each IS based on findings and recommendations from the SAR
Ensure that system recovery processes are monitored to ensure that security features and procedures are properly restored
Ensure all AIS security-related documentation is current and accessible to properly authorized individuals
Ensure that system security requirements are addressed during all phases of the system life cycle
Participate in self-inspections; identify security discrepancies and report security incidents
Coordinate all technical security issues outside of area of expertise or responsibility with SSE
Provide expert research and analysis in support of expanding programs and area of responsibility
Perform file transfers between local systems to storage devices

Experience:
7 - 9 years related experience
Minimum of four (4) years experience in SAP and Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
Education:
Bachelors degree in a related discipline or equivalent experience (4 years)
Certifications:
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 3 within 6 months of the date of hire.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents.
Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision
Willingness to travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
Must be able to lift 50 lbs Qualifications Requires Bachelor's degree or equivalent and seven to nine years of related experience and ability to obtain a security clearance. Knowledge of DOD, DOE, or other industrial security program and in-depth knowledge of the DOD, DOE, or other government security regulatory manuals. Degrees See Qualifications Years of Experience See Qualifications Position Type Full-TimeEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.