About The Position

RiVidium Inc, (dba TripleCyber), is seeking a Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009). Responsibilities and abilities for this position shall include, but not limited to: Manage and approve Accreditation Packages (e.g., ISO/IEC 15026-2). Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network. Establish acceptable limits for the software application, network, or system. Manage Accreditation Packages (e.g., ISO/IEC 15026-2). Ability to assess and forecast manpower requirements to meet organizational objectives. Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities. Ability to coordinate cyber operations with other organization functions or support activities. Ability to identify external partners with common cyber operations interests. Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives. Ability to work across departments and business units to implement organization's privacy principles and programs and align privacy objectives with security objectives. Ability to relate strategy, business, and technology in the context of organizational dynamics. Ability to understand technology, management, and leadership issues related to organization processes and problem solving. Ability to understand the basic concepts and issues related to cyber and its organizational impact. Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.

Requirements

  • Bachelor's degree or higher from an accredited college or university
  • IAM Level 2 Certification is required
  • Top Secret SCI Clearance

Nice To Haves

  • Prefer an accredited Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree, or a degree in a Mathematics or Engineering field.

Responsibilities

  • Manage and approve Accreditation Packages (e.g., ISO/IEC 15026-2)
  • Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network
  • Establish acceptable limits for the software application, network, or system
  • Manage Accreditation Packages (e.g., ISO/IEC 15026-2)
  • Assess and forecast manpower requirements to meet organizational objectives
  • Develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities
  • Coordinate cyber operations with other organization functions or support activities
  • Identify external partners with common cyber operations interests
  • Interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives
  • Work across departments and business units to implement organization's privacy principles and programs and align privacy objectives with security objectives
  • Relate strategy, business, and technology in the context of organizational dynamics
  • Understand technology, management, and leadership issues related to organization processes and problem solving
  • Understand the basic concepts and issues related to cyber and its organizational impact
  • Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
  • Identify critical infrastructure systems with information communication technology that were designed without system security considerations
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service