System High

Security Control Assessor (SCA) I, II & III

3+ months agoMaryland Heights, MO

LocationNationwide Supporting Full-Time/Part-Time -unspecified- Number of Openings1 Clearance Description
This is an upcoming Q2 position

The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer's area of responsibility.

  • Level I & II requirements: Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure
  • Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)
  • Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues
  • Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization
  • Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required
  • Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system
  • Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary
  • Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR
  • Evaluate security assessment documentation and provide written recommendations for security authorization to the Government
  • Discuss recommendation for authorization and submit the security authorization package to the
AO/DAO
  • Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.
  • Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy
  • Assist the Government compliance inspections
  • Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken
  • Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)
  • Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries
  • Evaluate the effectiveness and implementation of Continuous Monitoring Plans
  • Represent the customer on inspection teams
  • Level III additional requirements:
  • Evaluate the differences and have a working knowledge of Information Systems and Network Appliances operating at Protection Level 3 (PL3) and Protection Level 4 (PL4)
  • Differentiate the differences between the various types of Cross-Domain Solutions (CDS)
  • Assist with joint assessments of Cross-Domain Solutions with other DoD agencies
Position Requirements
Security Clearance Requirement:
  • Current Top Secret Clearance with SCI Eligibility
  • Eligibility for access to Special Access Program Information
  • Willingness to submit to a Counterintelligence polygraph
Educational and Position Requirements:
  • Level I Requirements: Bachelor's degree or equivalent experience and 5 - 7 years related experience
  • Minimum of three (3) years' experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
  • Prior performance in the role of ISSO and ISSM
  • Level II Requirements: Bachelor's degree or equivalent experience and 7 - 9 years related experience
  • Minimum of four (4) years' experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
  • Prior performance in the role of ISSO and ISSM or SCA
  • Level III Requirements: Bachelor's degree or equivalent experience and 9 - 12 years related experience
  • Minimum of nine (9) years' experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
  • Prior performance in the role of ISSO and ISSM or SCA
Certifications:
  • Level I requirements: Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level I within 6 months of the date of hire
  • Level II requirements: Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level II within 6 months of the date of hire
  • Level III requirements: Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level III or Information Assurance Architect and Engineer Level I within 6 months of the date of hire
Other Requirements:
  • Level I & II additional requirements: Must be able to regularly lift 50lbs
  • Level III additional requirements: Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
  • Mastery of Microsoft Office (Word, PowerPoint, and Excel)
Additional Information About the OrganizationFrom our start in 2005, System High has been recognized as the provider of choice for innovative security engineering. Delivering high-end information protection services, over 50% of our security professionals are US Military veterans. Patriotism, commitment to excellence, and successful mission accomplishment permeate our corporate culture. Whether designing or constructing secure facilities (SCIFs), performing IT systems certification and accreditation, establishing regulatory compliant corporate security programs, or producing life-cycle protection planning for complex systems acquisitions, System High has the expertise and tools to facilitate mission success.
System High is a Military friendly employer. Our extensive work on behalf of the U.S. government offers those who have served in uniform an opportunity to continue to serve their country in a new and exciting way while enjoying a successful civilian career. EOE StatementWe are an equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status or any other characteristic protected by law. supervisorUIDNone Specified

This position is currently accepting applications.