Security Control Assessor

Amatriot GroupArlington, VA
14h$157,000 - $170,000Onsite

About The Position

The Security Control Assessor (SCA) is responsible for conducting comprehensive assessments of management, operational, and technical security controls within Information Systems (IS) to determine overall control effectiveness. The SCA evaluates whether controls are implemented correctly, operating as intended, and meeting established security requirements. This role supports Collateral, Sensitive Compartmented Information (SCI), and Special Access Program (SAP) systems within the customers area of responsibility and operates within the Risk Management Framework (RMF) in accordance with the Joint SAP Implementation Guide (JSIG).

Requirements

  • Active TS/SCI clearance with CI Polygraph
  • Bachelors degree (or equivalent combination of education and experience)
  • 57 years of related cybersecurity experience
  • Minimum 3+ years of experience supporting SAP, SCI, or Collateral Information Systems
  • Prior experience serving as an Information Systems Security Officer (ISSO) and/or Information Systems Security Manager (ISSM)
  • Experience implementing and assessing security controls under RMF
  • Working knowledge of JSIG requirements and authorization processes
  • DoD 8570 compliant: IAT Level III OR IAM Level I certification required
  • IAM Level I acceptable in lieu of IAT Level III
  • Completion of Combatting Trafficking in Persons (CTIP) training

Nice To Haves

  • Direct SAP experience
  • Experience preparing authorization packages for AO/DAO approval
  • Experience supporting government compliance inspections
  • Strong analytical and written communication skills for formal security documentation

Responsibilities

  • Conduct security control assessments in accordance with RMF and JSIG guidance
  • Perform oversight of the development, implementation, and evaluation of IS security program policy, with emphasis on SAP network integration
  • Prepare and document Security Assessment Reports (SARs) for authorization boundaries
  • Initiate and track Plans of Action and Milestones (POA&Ms) for identified vulnerabilities
  • Evaluate authorization packages and provide written recommendations to the Authorizing Official (AO) and/or Delegated Authorizing Official (DAO)
  • Advise ISO, IDO, PSO, AO/DAO on assessment and authorization matters
  • Assess system threats and vulnerabilities and determine required safeguards
  • Evaluate Confidentiality, Integrity, and Availability (CIA) impact levels
  • Assess proposed changes to authorization boundaries and operating environments
  • Evaluate hardware and software changes for security impact
  • Review sanitization and clearing procedures in accordance with government policy
  • Evaluate implementation of Continuous Monitoring Plans
  • Support compliance inspections and cybersecurity-related incident response activities
  • Ensure security considerations are addressed throughout the System Development Life Cycle (SDLC)
  • Represent the customer on inspection teams as required
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service