COMFORT SYSTEMS
Req ID:
RQ212818
Type of Requisition:
Regular
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Skills:
Information Security,Information Systems,Risk Mitigation Strategies,System Security
Experience:
5 + years of related experience
US Citizenship Required:
Yes
Job Description The
SCA
is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).
SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented θέμα‑Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.
Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure.
Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)
Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues.
Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization.
Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required.
Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system.
Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary.
ுக் Authorization Boundaries assessed, based on findings and recommendations from the SAR.
Evaluate security assessment documentation and provide written recommendations for security authorization to the Government.
Discuss recommendation for authorization and submit the security authorization package to the AO/DAO.
Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.
opção Review and concur with all sanitizations and clearing procedures in accordance with Government guidance and/or policy.
Assist the Government compliance inspections.
Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken.
Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)
روغ Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries.
Evaluate the effectiveness and implementation of Continuous Monitoring Plans.
Represent the customer on inspection teams.
Other Requirements
Must be able to regularly lift 50lbs
Experience
5-7 years related experience.
Minimum of three (3) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
Prior performance in the role of ISSO and ISSM.
Education
jurk Bachelor’s degree in a related discipline OR Associate’s degree in a related area + 2 years’ experience OR equivalent experience (4 years)
Certifications
IAT Level 3 (CISSP, CASP+.Pages) or IAM Level 1 - within 6 month of hire
Security Clearance
TS/SCI
Must be willing to submit to a CI polygraph.
Benefits
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career
Professional growth opportunities including paid education and certifications
Cutting-edge technology you can learn from
Rest and recharge with extra paid vacation and holidays
The likely salary range for this position is $142,792 - $158,815. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
#J-18808-Ljbffr
RQ212818
Type of Requisition:
Regular
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Skills:
Information Security,Information Systems,Risk Mitigation Strategies,System Security
Experience:
5 + years of related experience
US Citizenship Required:
Yes
Job Description The
SCA
is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).
SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented θέμα‑Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.
Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure.
Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)
Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues.
Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization.
Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required.
Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system.
Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary.
ுக் Authorization Boundaries assessed, based on findings and recommendations from the SAR.
Evaluate security assessment documentation and provide written recommendations for security authorization to the Government.
Discuss recommendation for authorization and submit the security authorization package to the AO/DAO.
Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.
opção Review and concur with all sanitizations and clearing procedures in accordance with Government guidance and/or policy.
Assist the Government compliance inspections.
Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken.
Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)
روغ Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries.
Evaluate the effectiveness and implementation of Continuous Monitoring Plans.
Represent the customer on inspection teams.
Other Requirements
Must be able to regularly lift 50lbs
Experience
5-7 years related experience.
Minimum of three (3) years’ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
Prior performance in the role of ISSO and ISSM.
Education
jurk Bachelor’s degree in a related discipline OR Associate’s degree in a related area + 2 years’ experience OR equivalent experience (4 years)
Certifications
IAT Level 3 (CISSP, CASP+.Pages) or IAM Level 1 - within 6 month of hire
Security Clearance
TS/SCI
Must be willing to submit to a CI polygraph.
Benefits
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career
Professional growth opportunities including paid education and certifications
Cutting-edge technology you can learn from
Rest and recharge with extra paid vacation and holidays
The likely salary range for this position is $142,792 - $158,815. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
#J-18808-Ljbffr