INTELLIGENCE TECHNICAL PROGRAM SME - 1133911819125
Arlington, VirginiaSENIOR PROGRAM ANALYST - 1133912114925
Arlington, VirginiaSENIOR NETWORK SPECIALIST - 1133911899062
Washington, District of ColumbiaINFORMATION SYSTEMS SECURITY MANAGER (ISSM) - 1133911900332
Washington, DCSENIOR TECHNICAL PROGRAM MANAGER - 1133912448562
Dayton, Ohio; Washington, District of ColumbiaSCHEDULER - MICROSOFT PROJECT - 1133911868171
Washington, DCMODEL-BASED SYSTEMS ENGINEER/MBSE - 1133910757361
Washington, DCSECURITY CONTROLS ASSESSOR - 1133911695626
Washington, District of ColumbiaSECURITY CONTROLS ASSESSOR - 1133911695665
Washington, DCSENIOR SYSTEMS ENGINEER - 1133912204266
Washington, DC; Dayton, OhioINFORMATION SYSTEMS SECURITY OFFICER (ISSO) - 1133912185513
Washington, District of Columbia; Dayton, OhioSENIOR SECURITY CONTROLS ASSESSOR REPRESENTATIVE (SCAR) - 1133912141202
Washington, District of Columbia; Dayton, Ohio
SECURITY CONTROLS ASSESSOR - 1133911695665
Washington, DCModern Technology Solutions, Inc. (MTSI) is a 100% employee-owned engineering services and solutions company that provides high-demand technical expertise in Digital Transformation, Modeling and Simulation, Rapid Capability Development, Test and Evaluation, Artificial Intelligence, Autonomy, Cybersecurity and Mission Assurance.
Modern Technology Solutions, Inc. (MTSI) is seeking a Security Control Assessor (SCA) to support an MTSI contract with the Assistant Secretary of the Air Force, Acquisition, Technology and Logistics.
The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an Information System (IS) to determine the overall effectiveness of the controls. SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.
Your essential job functions will include but may not be limited to:
- Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure.
- Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG).
- Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues.
- Evaluate authorization packages and make recommendations to the AO and/or DAO for authorization.
- Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required.
- Advise the Government concerning the impact levels for confidentiality, integrity, and availability for the information on a system.
- Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the authorization boundary.
- Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each authorization boundary assessed, based on findings and recommendations from the SAR.
- Evaluate security assessment documentation and provide written recommendations for security authorization to the Government.
- Assess proposed changes to authorization boundaries operating environment and mission needs to determine the continuation to operate.
- Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy.
- Assist the Government compliance inspections.
- Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken.
- Evaluate hardware and software to determine security impact that it might have on authorization boundaries.
- Evaluate the effectiveness and implementation of Continuous Monitoring Plans.
Required:
- 10+ years related experience required; 9 years' highly desired.
- Prior performance in roles such as System, Network Administrator or ISSO
- Minimum of 2 years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
- Prior performance in the role of ISSO and ISSM.
Education Requirements:
- Bachelor's Degree in Computer Science, Computer Engineering or a related field
Clearance Requirements:
- Current/active Top Secret/SCI; Current or recent DoD SAP access
- Subject to a Counterintelligence (CI) polygraph
#LI-LS1
#mtsi
#lawrenciumsaskatchewantrout
#LI-Onsite
