JOBSEARCHER

SCA 2 102-173

Security Control Assessor (SCA) 2- This is a future position that may come open and we are currently building our pipeline.Responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customers area of responsibility.Duties May include:Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructurePerform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint SAP Implementation Guide (JSIG)Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issuesEvaluate Authorization packages and make recommendation to the AO and/or DAO for authorizationEvaluate IS threats and vulnerabilities to determine whether additional safeguards are requiredAdvise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a systemEnsure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundaryInitiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAREvaluate security assessment documentation and provide written recommendations for security authorization to the GovernmentDiscuss recommendation for authorization and submit the security authorization package to the AO/DAOAssess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policyAssist the Government compliance inspectionsAssist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been takenEnsure organization are addressing and conducting all phases of the system development life cycle (SDLC)Evaluate Hardware and Software to determine security impact that it might have on Authorization boundariesEvaluate the effectiveness and implementation of Continuous Monitoring PlansRepresent the customer on inspection teams.Required Education and Experience:Bachelor's degree and 7-9 years related experience-OR- 11-13 years related experience in lieu of degreePrior performance in the role of ISSO and ISSM or SCA4+ years experience in SAP, SCI, or Collateral Information Systems security and implentation of regulations identified in the description of dutiesTraining:IAM Level II (in lieu of IAT Level III).Combatting Trafficking in Persons (CTIP)Security Clearance:Active TS/SCI Clearance and the willingness to sit for a CI polygraph, if needed