Jobs filters
CYBERSECURITY NETWORK ARCHITECT SME - 1133911972973
Arlington, Virginia; Dayton, Ohio; Huntsville, AlabamaCHIEF CYBERSECURITY ARCHITECT - 1133911974037
Arlington, Virginia; Huntsville, Alabama; Dayton, OhioSECURITY CONTROLS ASSESSOR - 1133911695692
Lorton, VirginiaSENIOR PROGRAM MANAGEMENT SUPPORT - 1133911695787
Lorton, VirginiaSENIOR PROGRAM INTEGRATOR - 1133911695821
Lorton, VirginiaSDA SATELLITE COMMUNICATIONS SME - 1133912573789
Chantilly, VirginiaMISSION ENGINEER SME - TEAM LEAD - 1133911748579
Arlington, Virginia; Dayton, Ohio; Huntsville, ALC2 OPERATIONAL SME (WARFIGHTER / MISSION INTEGRATION) - 1133911750803
Arlington, Virginia; Huntsville, AL; Dayton, OhioAIRWORTHINESS SUPPORT ENGINEER - 1133911067083
Washington, DCSENIOR CYBERSECURITY SYSTEMS ENGINEER - 1133911069572
Washington, DCSYSTEMS ENGINEER (INTEL COMMUNITY) - 1133910706446
Annapolis Junction, MarylandMISSION ENGINEERING AND CLOUD INTEGRATION ENGINEER SME - 1133911864055
Arlington, Virginia; Dayton, Ohio; Huntsville, AL
SECURITY CONTROLS ASSESSOR - 1133911695692
Lorton, VirginiaModern Technology Solutions, Inc. (MTSI) is a 100% employee-owned engineering services and solutions company that provides high-demand technical expertise in Digital Transformation, Modeling and Simulation, Rapid Capability Development, Test and Evaluation, Artificial Intelligence, Autonomy, Cybersecurity and Mission Assurance.
Modern Technology Solutions, Inc. (MTSI) is seeking a Security Control Assessor (SCA) to support an MTSI contract with the Assistant Secretary of the Air Force, Acquisition, Technology and Logistics.
The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an Information System (IS) to determine the overall effectiveness of the controls. SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.
Your essential job functions will include but may not be limited to:
- Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure.
- Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG).
- Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues.
- Evaluate authorization packages and make recommendations to the AO and/or DAO for authorization.
- Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required.
- Advise the Government concerning the impact levels for confidentiality, integrity, and availability for the information on a system.
- Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the authorization boundary.
- Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each authorization boundary assessed, based on findings and recommendations from the SAR.
- Evaluate security assessment documentation and provide written recommendations for security authorization to the Government.
- Assess proposed changes to authorization boundaries operating environment and mission needs to determine the continuation to operate.
- Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy.
- Assist the Government compliance inspections.
- Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken.
- Evaluate hardware and software to determine security impact that it might have on authorization boundaries.
- Evaluate the effectiveness and implementation of Continuous Monitoring Plans.
Required:
- 15+ years related experience required; 9 years' highly desired.
- Prior performance in roles such as System, Network Administrator or ISSO
- Minimum of 2 years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
- Prior performance in the role of ISSO and ISSM.
Education Requirements:
- Bachelor's Degree in Computer Science, Computer Engineering or a related field
Clearance Requirements:
- Current/active Top Secret/SCI; Current or recent DoD SAP access
- Subject to a Counterintelligence (CI) polygraph
#LI-LS1
#mtsi
#lawrenciumsaskatchewantrout
#LI-Onsite
