About The Position

Provide comprehensive management support for an organization's Information Assurance (IA) and cybersecurity programs. Oversee the development, implementation, and enforcement of Information System Security policies, standards, and methodologies. Maintain and manage the security posture of information systems, ensuring compliance with established security procedures and supporting day‑to-day cybersecurity operations. Guide system security documentation, configuration management, and security authorization activities in accordance with NSA/CSS Risk Management Framework (RMF) and DoD processes. Support systems engineering efforts, risk assessments, integration planning, and organizational oversight of security services across multiple programs.

Requirements

  • Twelve (12) years of related experience in security authorization.
  • Security tools and technologies
  • Hardware and software security implementation
  • Communication protocols
  • Encryption tools and techniques
  • Familiarity with commercial security products, security authorization methodologies, incident management, PKI, and authorization services.
  • Bachelor's degree in Computer Science or a related field (e.g., Engineering, Mathematics, Cybersecurity, Information Technology, Information Assurance, Information Security, Information Systems).
  • An additional four (4) years of relevant experience may be substituted for the bachelor's degree.
  • U.S. Citizenship is required for all applicants.
  • Employment is contingent upon successful completion of a security background investigation and polygraph.
  • DOD 8570 compliance with IAM III is required
  • This position requires an active Security Clearance with appropriate Polygraph.

Responsibilities

  • Manage and support the implementation, coordination, and enforcement of Information System Security policies, standards, and procedures.
  • Oversee daily security operations and maintain the operational security posture of assigned systems or programs.
  • Assist ISSEs and ISSOs in evaluating security solutions to ensure compliance with requirements for processing classified information.
  • Lead vulnerability assessments, risk analysis activities, and security authorization processes.
  • Provide configuration management oversight for security-related software, hardware, and firmware, including assessing security impacts of system changes.
  • Prepare, review, and manage security documentation such as System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
  • Support organizational security authorization activities following NSA/CSS RMF and DIACAP.
  • Conduct requirements gathering, functional analysis, and mapping of current security infrastructure to support future program development.
  • Collaborate with engineering teams on systems integration initiatives and lifecycle planning.
  • Plan, coordinate, and assist with the implementation of IT security programs and policies.
  • Analyze user needs and determine functional and cross-functional security requirements.
  • Compile and organize technical information regarding mission goals, security products, and ongoing multi-level security programs.
  • Perform functional allocation and identify resources required for task execution.
  • Provide risk assessments and support Government planning, coordination, and oversight of information security service implementation.
  • Assist Program Managers with administrative and technical oversight of portfolio programs.
  • Facilitate issue resolution through Integrated Product Teams and Technical Exchange Meetings (TEMs).
  • Provide daily direction and oversight to contractor ISSOs.
  • Oversee engineering efforts to design, develop, and implement solutions that meet security requirements.
  • Coordinate with customers, IT staff, and senior leadership to define and achieve cybersecurity objectives.
  • Serve as the program's Information System Security Manager (ISSM).
  • Support the development and implementation of NSA IT security services.
  • Advise Program Managers on administrative and technical matters related to cybersecurity and system oversight.
  • Contribute to the design and implementation of future IT systems and associated security architecture.

Benefits

  • Medical: CTP offers 3 superior plans, bringing our employees both in-network and out-of-network options.
  • Vision + Dental: Both free to you + paid in full by CTP.
  • Retirement: 401k - 6% company contribution
  • PTO + Leave: A work life balance is extremely important to our team here at CTP, which is why our paid time off plans are so lucrative. Offering customizable leave plans to meet your needs is just one of our many perks! Jury Duty, Bereavement + Military Leave provided.
  • Career Growth: Up to $10,000 provided for approved career-related learning, training, education, and/or tuition.
  • Life and AD&D Insurance/Short-Term & Long-Term Disability: More peace of mind, at zero cost to you.
  • Profit Sharing Bonus: End of year cash gets added to your bottom-line.
  • Referral Bonus Program: Our tiered program provides an incentive with each stage of the hiring process your referral passes. Our bonuses range from $7,000-$20,000, if your referral joins the team.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service