Security Control Assessor III w/ Active TS/SCI
6 days left
- Full Time
**Position requires an in-scope TS/SCI clearance.** Security Control Assessor; Level III SCA Level III Contractors shall possess all SCA Level II Contractor qualifications and the following additional qualifications. Included within the years of relevant experience must be the following: a. Practical experience performing information systems assessment and authorization (A&A) as defined in applicable DCID and ICD directives and guidance; b. Practical experience performing the processes involved in developing and implementing security related directives and guidance for Information Assurance; Information Technology; and Information Management; c. Practical experience utilizing risk management strategies for information technology solutions; d. Technical understanding of emerging technologies and their implementation within Government system and network environments; e. Knowledge of information technology concepts used in the evaluation of security performance and integrity of state-of-the-art applications; communications systems; hardware; software; satellite control systems; and information processing systems; f. Technical understanding of information technology systems; software; and networks; g. Ability to effectively coordinate A&A activities of industry and Government information systems to meet acquisition milestone requirements; h. Effective technical report and general correspondence writing ability; i. Ability to manage and track systems or programs involved in the A&A process. j. Experience developing and implementing security related directives and guidance for Information Assurance; Information Technology; and Information Management; k. Experience working with a mixed skill level team to ensure that appropriate knowledge and skill transfer occurs.
- Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents. 2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation. 3. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. 4. Evaluate firewall change requests and assess organizational risk. 5. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems. 6. Assists with implementation of counter-measures or mitigating controls. 7. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. 8. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. 9. Prepares incident reports of analysis methodology and results. 10. Provides guidance and work leadership to less-experienced technical staff members. 11. Maintains current knowledge of relevant technology as assigned. 12. Participates in special projects as required.