Conduct verification and validation for security compliance of low and moderately complex information systems, products, and components. Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures. Provide identification of non-compliance of security requirements and possible mitigations to requirements that are not in compliance. Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and guidelines for usage. Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures Conduct on-site evaluations Conduct verification and validation for security compliance of low and moderately complex information systems, products, and components Provide identification of non-compliance with security requirements and possible mitigations for requirements that are not in compliance Validate the security requirements of the information system Verify and validate that the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetration testing, and deliver a comprehensive verification and validation report (certification report) for the information system Facilitate penetration testing Provide a comprehensive verification and validation report (certification report) for the information system
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level