About The Position

Provide support for a program, organization, system, or enclave's information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configuration management (CM) for information systems security software, hardware, and firmware. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF). Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies Assist with preparation and maintenance of documentation Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information Assist with Configuration Management (CM) for information system security software, hardware, and firmware Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades Propose, coordinate, and implement information systems security policies, standards, and methodologies Develop and maintain documentation for Security Authorization in accordance with ODNI and DoD policies Provide CM for security-relevant information system software, hardware, and firmware Ensure compliance with system security policy Evaluate security solutions to ensure they meet security requirements for processing classified information Maintain operational security posture for an information system or program Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave Develop and update the system security plan and other Cybersecurity documentation Assist with the management of security aspects of the information system and perform day-today security operations of the system Track and ensure appropriate user identification and authentication mechanism of the Information System (IS) Obtain system authorization for ISs under their purview Provide support for a program, organization, system, or enclave's information assurance program Plan and coordinate implementation of IT security programs and policies Manage and control changes to the system assessing the security impact of those changes Provide daily oversight and direction to contractor ISSOs Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives

Requirements

  • Eight (8) years of combined work-related experience in the fields of IT, cybersecurity or security authorization is required.
  • Experience in at least two of the following areas is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques.
  • Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
  • Bachelor's degree in Computer Science or a related field (e.g. General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems) is required.
  • In lieu of a Bachelor's degree, four (4) additional years of work-related experience may be substituted
  • U.S. Citizenship is required for all applicants.
  • Employment is contingent upon successful completion of a security background investigation and polygraph.
  • DoD 8570 compliance with IAM I is required
  • This position requires an active Security Clearance with appropriate Polygraph.

Responsibilities

  • Provide support for a program, organization, system, or enclave's information assurance program.
  • Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
  • Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
  • Assist with the management of security aspects of the information system and perform day-to-day security operations of the system.
  • Evaluate security solutions to ensure they meet security requirements for processing classified information.
  • Perform vulnerability/risk assessment analysis to support security authorization.
  • Provide configuration management (CM) for information systems security software, hardware, and firmware.
  • Manage changes to system and assess the security impact of those changes.
  • Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
  • Support security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).
  • Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
  • Assist with preparation and maintenance of documentation
  • Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
  • Assist with Configuration Management (CM) for information system security software, hardware, and firmware
  • Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
  • Propose, coordinate, and implement information systems security policies, standards, and methodologies
  • Develop and maintain documentation for Security Authorization in accordance with ODNI and DoD policies
  • Provide CM for security-relevant information system software, hardware, and firmware
  • Ensure compliance with system security policy
  • Evaluate security solutions to ensure they meet security requirements for processing classified information
  • Maintain operational security posture for an information system or program
  • Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave
  • Develop and update the system security plan and other Cybersecurity documentation
  • Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
  • Track and ensure appropriate user identification and authentication mechanism of the Information System (IS)
  • Obtain system authorization for ISs under their purview
  • Provide support for a program, organization, system, or enclave's information assurance program
  • Plan and coordinate implementation of IT security programs and policies
  • Manage and control changes to the system assessing the security impact of those changes
  • Provide daily oversight and direction to contractor ISSOs
  • Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives

Benefits

  • Medical: CTP offers 3 superior plans, bringing our employees both in-network and out-of-network options.
  • Vision + Dental: Both free to you + paid in full by CTP.
  • Retirement: 401k - 6% company contribution
  • PTO + Leave: A work life balance is extremely important to our team here at CTP, which is why our paid time off plans are so lucrative. Offering customizable leave plans to meet your needs is just one of our many perks! Jury Duty, Bereavement + Military Leave provided.
  • Career Growth: Up to $10,000 provided for approved career-related learning, training, education, and/or tuition.
  • Life and AD&D Insurance/Short-Term & Long-Term Disability: More peace of mind, at zero cost to you.
  • Profit Sharing Bonus: End of year cash gets added to your bottom-line.
  • Referral Bonus Program: Our tiered program provides an incentive with each stage of the hiring process your referral passes. Our bonuses range from $7,000-$20,000, if your referral joins the team.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service