Peraton is hiring an Information Security Manager /Chief Security Architect that will serve as the principal advisor on all cybersecurity matters, technical and otherwise, involving the security of infrastructure supporting delivery of enterprise information technology services to a state agency. This position is remote. Day to Day Roles and Responsibilities: Ensuring all aspects of the project remain in compliance with all applicable security standards and requirements. Ensures the implementation of the Risk Management Framework (RMF), through the required government policy, make recommendations on process tailoring, participate in and document process activities. Will deliver information security support and design recommendations adhering to customer security policies and compliance mandates while fulfilling customer requirements. Will perform periodic assessments of systems and networks within the networking environment and/or enclave and will identify where those systems and networks deviate from acceptable configurations, enclave policy, and compliance requirements. Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction and release, emerging technology research inspections and periodic audits. Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards. Document the results of Assessment and Authorization (A&A) activities and technical or coordination activity and prepare the System Security Plans and update the Plan of Actions and Milestones (POA&M). Provide oversight and guidance of information security personnel performing system analysis looking for patterns of non-compliance; ensure appropriate administrative or programmatic actions which minimize security risks and insider threats. Provide oversight and guidance ensuring systems are properly configured, optimized, and tested ensuring all policy and technical standards are met. Manage all cybersecurity related processes and procedures in the documentation of access control lists on routers, firewalls, CE, printing devices, and other network devices. Assess the performance of cybersecurity security controls within the environment. Perform control validation and remediation validation of network servers, routers, and switches to ensure they comply with security policy, procedures, and technical requirements. Evaluate potential cybersecurity security risk and take appropriate corrective and recovery action utilizing various tasking mechanisms such as Service Now
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level