SCA Security Control Assessor

Location: Arlington, VA
Date Posted: 06-06-2017
Currently seeking several Security Control Assessors for a long term, newly awarded 5 year joint Army/Air Force Contract. These positions are located in Arlington, VA and require a minimum of an active Secret clearance
 
Certification Requirements:
• DoD 8570.01/DoDD 8140 IAM Level I Compliant or replacement directives  
 
Years of Experience/Education Requirements:
  • Bachelors degree in a related discipline or four (4) years equivalent experience in lieu of…
  • 7-9 years related experience (9 years minimum, if no degree)
 
Required Skills (Knowledge, Skills, Abilities):
• Knowledge of DITSCAP, RMF, DoD C&A processes,  DoD 8500 (Cybersecurity) series and Common Criteria
• Experience in JAFAN 6/3 or ICD 503, Joint Special Access Programs Implementation Guide (JSIG) and NISPOM application as related to C&A
 
Position Overview:
The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).  SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral and Special Access Program (SAP) activities within the customer’s area of responsibility.   
 
The SCA will perform the following responsibilities:
  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures
  • Perform analysis of network security, based upon the DITSCAP, RMF and JSIG; advise customer on IT certification and accreditation issues
  • Perform risk assessments and make recommendations to customers
  • Advise government program managers on security testing methodologies and processes
  • Evaluate certification documentation and provide written recommendations for accreditation 
  • Periodically review system security to accommodate changes to policy or technology
  • Evaluate IT threats and vulnerabilities to determine whether additional safeguards are needed
  • Develop, implement, provide guidance, and enforce AIS security policies and procedures
  • Ensure that all ISSOs, network administrators, and other AIS personnel receive the necessary technical and security training to carry out their duties
  • Develop, review, endorse, and recommend action by the designated approval authority (DAA)/Authorizing Official (AO) of system certification documentation
  • Ensure approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output
  • Conduct certification tests that include verification that the features and assurances required for each protection level fare functional
  • Maintain a repository for all system certification/accreditation documentation and modifications
  • Coordinate AIS security inspections, tests, and reviews
  • Develop policies and procedures for responding to security incidents, and for investigating and reporting security violations and incidents
  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system
  • Ensure that data ownership and responsibilities are established for each AIS, to include accountability, access rights, and special handling requirements
  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local AIS security training.
  • Ensure that security testing and evaluations are completed and documented
  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed
  • Assess changes in the system, its environment, and operational needs that could affect the accreditation • Conduct periodic testing of the security posture of the AIS
  • Ensure configuration management (CM) for security-relevant AIS software, hardware, and firmware are properly documented.
  • At the conclusion of each security assessment activity, prepare the final Security Assessment Report (SAR) containing the results and findings from the assessment
  • Initiate a POA&M with identified weaknesses and suspense dates for each IS based on findings and recommendations from the SAR
  • Ensure that system recovery processes are monitored to ensure that security features and procedures are properly restored
  • Ensure all AIS security-related documentation is current and accessible to properly authorized individuals
  • Ensure that system security requirements are addressed during all phases of the system life cycle
  • Participate in self-inspections; identify security discrepancies and report security incidents
  • Coordinate all technical security issues  outside of area of expertise or responsibility with SSE
  • Provide expert research and analysis in support of expanding programs and area of responsibility
  • Perform file transfers between local systems to storage devices
 
 
 
or
this job portal is powered by CATS