Conduct verification and validation for security compliance of low and moderately complex information systems, products, and components. Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures. Provide identification of non-compliance of security requirements and possible mitigations to requirements that are not in compliance. Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and guidelines for usage Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures Conduct on-site evaluations Conducts verification and validation for security compliance of low and moderately complex information systems, products, and components Provide identification of non-compliance of security requirements and possible mitigations to requirements that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system