Security Control Assessor

Booz Allen HamiltonSan Antonio, TX
4d

About The Position

Security Control Assessor Key Role: Design, implement, and manage policies and procedures to ensure database and software security. Apply advanced skills, extensive technical expertise, and full industry knowledge. Develop innovative solutions to complex problems. Work without considerable direction. Mentor and supervise team members.

Requirements

  • Experience in an ISSE, ISSO, or IT role
  • Experience with HBSS or Trellix, Active Directory, and Group Policy
  • Experience with Security Technical Implementation Guide (STIG)
  • Experience with vulnerability management, including ACAS, Nessus, NexPose, or OpenVAS
  • Experience administering, maintaining, and implementing upgrades and ensuring the readiness of several classified virtual enterprise systems and corresponding technologies, such as Enterprise Linux, Cisco Systems, Juniper, including Switch, Router, or NGFW, Red Hat, Palo Alto, Windows Server, or Windows Workstation
  • Knowledge of how system engineers or administrators perform system hardening utilizing STIGs
  • Knowledge of Information Assurance (IA) concepts, practices, and procedures using established DoD security policies and standards to mitigate RMF security risks
  • TS/SCI clearance
  • HS diploma or GED
  • DoD 8140 Level II Certification

Nice To Haves

  • Experience with ICAM principles and technologies such as multi-factor authentication and privileged access management
  • Experience with DoD architecture, strategic planning, concept of operations, performance attributes, system architecture and design, evolving methodologies, and statutory or regulatory requirements
  • Experience with Security Information and Event Management (SIEM) systems such as Splunk, Elastic, Logstash, or Kibana
  • Experience with data broker technologies such as Cribl or Confluent, operating system security events such as Windows or Linux, and networking protocols such as TCP/IP, DNS, DHCP, or HTTP/HTTPS
  • Experience with cybersecurity tools and technologies such as IDS or IPS, firewalls, host-based security, or Identity and Access Management (IDAM), and DevSecOps tools and practices such as CI/CD pipelines, including GitLab CI/CD or Azure DevOps
  • Knowledge of Zero Trust principles and frameworks such as NIST 800-207
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related technical field
  • Offensive Security Certified Professional (OSCP), GIAC Certified Incident Handler (GCIH), or GIAC Vulnerability Assessment Professional (GVAP) Certification

Benefits

  • health
  • life
  • disability
  • financial
  • retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service