Security Control Assessor (SCA) - Top Secret clearance Law Enforcement & Security - Springfield, VA at Geebo

Security Control Assessor (SCA) - Top Secret clearance

OverviewVectrus is a rapidly growing, energetic, and win-focused enterprise supporting Federal government, military, and civilian agencies.
We are an organization committed to growth and shared success for all stakeholders; we are customer-driven, mission-focused, and operate with integrity and trust in all relationships.
We have a great opportunity for a Security Control Assessor (SCA) in Springfield, VA.
The position is required to be onsite and requires the ability to travel.
This position will require U.
S.
Citizenship and an active DoD Top Secret SCI clearance and have the ability to obtain and maintain a Counterintelligence (CI) Polygraph.
Responsibilities The Security Control Assessor (SCA) will conduct and document a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an information system.
Determine the overall control effectiveness through documentation review, inspections, testing, and interviews.
Provide an assessment of the severity of weakness or deficiencies and recommend corrective actions to address identified vulnerabilities.
Provide initial mitigation of Cybersecurity incidents, support incident investigations, and closure of the incidents.
Provide assessment of proposed technology (hardware, software, and firmware) for Cybersecurity vulnerabilities.
Assessment of security controls and organizational requirements shall include:
Assessment Package Feedback which focuses on the documentation submitted to support the various steps of Risk Management Framework (RMF).
Recommend a format for this document for government approval.
Security Assessment Report which focuses on the assessment of an information system in support of the authorization determination.
Shall provide a draft report using the government provided template; may recommend format changes for government consideration.
Periodic Cybersecurity Assessment Report or Security Compliance Report which focuses on the assessment of a Cybersecurity program at a location.
Shall provide a draft report using the government provided template; may recommend format changes for government consideration.
Cybersecurity Incident Reports which focus on documenting Cybersecurity incidents.
Shall provide a draft report using the government provided template; may recommend format changes for government consideration.
Technical Assessment of Hardware, Software, or Firmware.
Shall document the technical assessment addressing Cybersecurity vulnerabilities via a government agreed format, such as a Help Desk ticket application, electronic mail, memorandum, etc.
Shall develop an annual compilation of findings and observations based upon the Security Assessment Reports and Periodic Cybersecurity Assessment Reports or Security Compliance Reports based upon fiscal year assessments.
The format shall be recommended for government approval.
The compilation shall be void of system names, system identification numbers, government or contractor locations, and individual names.
Draft and/or preliminary documents shall be presented in one of the following electronic formats:
Microsoft Office version 2007 compatible (.
docx,.
xlsx, or.
pptx) or the standard Portable Document Format (PDF) format.
Final and/or approved format shall be determined by the government; may recommend additional formats.
Incumbent travel requirements are approximately 30% annually to support critical business needs.
Travel location are CONUS and some OCONUS locations.
Qualifications Shall have 4 or more years of experience in the validation of security configuration of operating systems.
Shall have 2 or more years of experience applying Risk Management Framework (RMF) as described in the National Institute of Standards and Technology Special Publications.
Shall meet the Cyber IT/Cybersecurity Workforce (CSWF) Security Control Assessor (612); Intermediate Level for SECNAV M-5239.
2 compliance.
(See Navy Cool WebSite) Travel Requirements:
Travel approximately 30% annually.
Travel location are CONUS and some OCONUS locations.
Education:
Bachelor Degree from accredited University; or Certification:
Certified Authorization Professional (CAP); or Cisco Certified Network Associate (CCNA) Routing and Switching; or CompTIA Security
ce
Qualifications:
Strongly desired experience with application of the Defense Information Systems Agency (DISA) Security Technical Implementation Guides.
Operating System/Computing Environment certificate for Windows Server 2012 or newer UNIX (Linux (Red Hat), Solaris).
Experience with vulnerability scanners.
Experience with Cloud technologies.
Documented (certificate) RMF training provided by the Intelligence Community or DoD SAP community.
Experience with assessing security relevant applications.
Experience as a System Administrator, Information System Security Manager, or Information System Security Officer.
Experience applying the requirements of the DoD Joint Special Access Program Implementation Guide (JSIG) to information systems or Cybersecurity programs.
A cyber credential at the Master proficiency level for specialty area Securely Provision - Risk Management as outlined in SECNAV M-5239.
2.
Experience with Cross Domain Solutions (CDS).
Security Clearance Requirements:
This position will require U.
S.
citizenship and an active DoD Top Secret clearance.
Candidate must be willing to obtain and pass a Counterintelligence (CI) Polygraph.
Requests for reasonable accommodation will be considered to enable individuals with disabilities to perform the principal (essential) functions of this job.
We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual.
This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace.
Vectrus is an Equal Opportunity /Affirmative Action Employer.
All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability.
EOE/Minority/Female/Disabled/Veteran.
Recommended Skills Assessments Business Requirements Cisco Certified Network Associate Cloud Technologies Comp Tia Security
Firmware Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.