Responsible for the development, deployment and execution of controls and defenses to ensure the security of company technology, information systems, and system deliverables. Essential Functions: Develops and implements appropriate standards and criteria for hardware, software, access and encryption requirements. Establishes system security designs and validates compliance requirements. Assesses and mitigates system security threats and risks throughout the program life cycle. Performs system certification and accreditation planning, testing, and validation activities in coordination with government customers. Supports secure systems operations and maintenance. Conducts internal information technology system audits and risk assessments and reports findings and recommendations for corrective actions to management. Executes first level responses and addresses reported or detected incidents. Investigates and analyzes all response activities related to cyber incidents. Interprets, analyzes, and reports all events and anomalies in accordance with directives, to include initiating, responding, and reporting discovered events. Research, evaluates, tests, recommends, communicates and implements new security software or devices Provide details for developing Information System Security (ISS) Risk Management Framework (RMF) documentation (SSP, SAR, RAR, SAP, SCTM, POA&M, etc.) to support the Assessment & Authorization (A&A) of assigned system(s) Performs ISS controls verification and validation as part of the systems’ Continuous Monitoring Plan Oversees configuration management of assigned systems Performs periodic hardware/software inventory audits Identifies system security controls shortcomings and annotates POA&M entries for deficient items, playing a vital role with remediating control deficiencies
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees