2 days old

Information Systems Security Respresentative

Washington, DC 20004
Responsibilities

General overview: Provides feedback to design engineers and evaluates end-to-end systems and systems-oriented products through their entire life cycle. Working as expert, conducts research and evaluates technical performance of software products and overall segments and systems. Ensures products and systems comply with requirements and government information assurance and cyber security standards and practices through formal verification methods. Verifies/validates systems with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to information networks. Assesses performance using evaluation criteria and technical performance measures. Prepares assessments and cyber threat profiles of current and planned products based on sophisticated testing, research, and analysis. Participates in design reviews of components (hardware and software) to ensure applicability to the current system and traceability of requirements. Reviews test plans/procedures and ensures they verify/validate the requirements. Develops and maintains analytical procedures to meet changing requirements. Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and operations officials.

Our task order provides on-site technical and administrative Security Assessment and Authorization (A&A) and Continuous Monitoring (CM) support for the client enterprise wide.

The Information Systems Security Representative (ISSR) implements security control assessment principles to review security requirements, verify implementation, and provide mitigation recommendations throughout the Information Systems life cycle to facilitate secure systems for A&A and Continuous Monitoring support.

The ISSR responsibilities include, but are not limited to: Serving as the Information Assurance Section subject matter expert for the A&A and Continuous Monitoring processes. Providing security requirements analysis of Information Systems (IS) architectures and designs. Possess a strong understanding IS security controls/requirements and have the ability to provide guidance to the System Owners and System Teams and recommending implementation strategies. Identifying IS vulnerabilities and recommending mitigation alternatives for POA&M items. Reviewing IS security test results to identify weaknesses, technical flaws, and vulnerabilities. Recommending technical process improvements for the A&A process.

Qualifications

BS 8-10, MS 6-8, PhD 3-5
5-6 years IA and InfoSec experience; which includes developing and reviewing security concept of operations, systems security plans, security control assessments, contingency plans, configuration management plans, incident response plans, plan of actions and milestones, risk management plans, vulnerability scanning, and/or vulnerability management plans
Five years security control assessment experience; which includes systems A&A principles, requirements analysis, system development (software and hardware); network security architecture concepts (topology, protocols, components); and/or IT security principles and methods (firewalls, demilitarized zones, encryption)
Experience with FISMA and RMF/A&A processes
Experience with NIST SP (800-27, 30, 37, 53, 60, 137, 144, 145), FIPS (199, 200), CNSSI 1253 experience
CISSP (required) and CISM or GSLC; or, ability to obtain CISM or GSLC within 6 months of hire
Active Top Secret clearance, periodic review (PR) performed within the past three years, SCI eligibility

Email this job to a friendRefer
Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed




As a government contractor, Perspecta abides by the following provision
PAY TRANSPARENCY NONDISCRIMINATION PROVISION
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)

Industry

  • Information Technology
Posted: 2019-11-10 Expires: 2019-12-09

With offerings in mission services, digital transformation and enterprise operations, our team of 14,000 engineers, analysts, investigators and architects work tirelessly to create innovative solutions. We have the expertise and experience not only to devise solutions, but to execute on them successfully.

Sponsored by:
Farm Credit Services of America Logo
Sponsored by:
Bank of America Logo

Featured Jobs[ View All ]

Featured Employers

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Information Systems Security Respresentative

Perspecta
Washington, DC 20004

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast