Peraton is seeking an Sr Information Systems Security Officer to support our Federal Strategic Cyber programs. In this role, you will serve as Task Lead and be well-versed in best practices for cyber security program standards, processes, and procedures compliance, industry-standard security frameworks and demonstrated expert working knowledge of NIST Special Publication (SP) 800-53: Recommended Security Controls for Federal Information Systems, NIST SP 800-53A: Guide for Assessing the Security Controls in Federal Information Systems, AFPD 17-1 and AFI 17-130, Cybersecurity Program Management. You will write security policies and procedures, CSS, SSP, SSPP, and assess all ATO package artifacts. You will have expert knowledge of Risk Management Framework (RMF) v5 (Processes, workflow, etc.) and the ability to use eMASS to execute RMF v5 to include document/update system status, identify, document, and manage implementation of operational and technical security controls, implementation and risk assessment tabs, non-compliant and non-validated controls, POAM management (entry, evidence, close-out), produce reports and track Plan of Action and Milestone (POA&M) due dates, etc. You will possess the ability to complete a checklist to ensure Security Authorization Process documents are complete and comply with all guidance. You will demonstrate the ability to work collaboratively with IT counterparts, communicate effectively (skilled in communicating complex technical information to non-technical audience) and coordinate STIG remediation with system administrators and developers. You will have the ability to conduct risk assessments, monitor security incidents and respond appropriately to security threats. You will have a working understanding of network technology (includes knowledge of network protocols, TCP/IP), operating systems as well as the necessary security protocols, system details (Architecture, data flow, security cat, requirements, configuration management process/procedures, and user profile) firewalls, rules and configurations, intrusion detection tools and prevention systems, encryption techniques, Windows, Unix, and Linux) operating systems, along with other applications such as databases and web servers.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Senior