Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailCome make your mark with Watermark!
FOUNDED BY USAF VETERANSin 2007 we are proud to be a ServiceDisabled Veteran Owned Small Business.
SUBJECT MATTER EXPERTSspecializing in security and risk management. Were intimately familiar with DOD security programs and mission requirements.
OUR CORE VALUESdrive every action we take as a company. We strive to exhibit PERSPECTIVE PASSION COMMUNICATION INTEGRITY AND ETHICS and BALANCE in all we do.
COMPETITIVE BENEFITS PACKAGEto address our employees physical mental emotional and financial wellbeing. This includes 100 employer paid medical insurance ample paid leave a free employee assistance program and a competitive 401k savings plan. At Watermark our people come first!
Security Control Assessor III
The SCA is responsible for conducting a comprehensive assessment of the management operational and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e. the extent to which the controls are implemented correctly operating as intended and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customers area of responsibility.
This position is currently contingent on funding.*
In this role you will
Perform oversight of the development implementation and evaluation of IS security program policy;special emphasis placed upon integration of existing SAP network infrastructure
Perform assessment of ISs based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)
Advise the Information System Owner (ISO) Information Data Owner (IDO) Program SecurityOfficer (PSO) and the Delegated and/or Authorizing Official (DAO/AO) on any assessment andauthorization issues
Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization
Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required
Advise the Government concerning the impact levels for Confidentiality Integrity and Availabilityfor the information on a system
Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary
Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed based on findings and recommendations from the SAR
Evaluate security assessment documentation and provide written recommendations for security authorization to the Government
Discuss recommendation for authorization and submit the security authorization package to the AO/DAO
Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.
Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy
Assist the Government compliance inspections
Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken
Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)
Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries
Evaluate the effectiveness and implementation of Continuous Monitoring Plans
Evaluate the differences and have a working knowledge of Information Systems and Network Appliances operating at Protection Level 3 (PL3 and Protection Level 4 (PL4
Experience Requirements:
Education Requirements:
Certification Requirements:
Security Clearance Requirements:
Other Requirements:
KEYWORDS: RMF Risk Management Framework ICD Information Assurance IA IAO IAT IAM A&A A Network Security Nonclassified Internet Protocol Router Network (NIPRNet)Secret Internet Protocol Router Network (SIPRNet) DISA Security Technical Implementation Guides (STIGs) CISSP CASP
Watermark provides salary ranges with job postings in states where it is legally required; any other salary ranges associated with our postings are third party estimates and may not be an accurate reflection of Watermarks total compensation package. Multiple considerations are taken into account when determining the final salary/hourly rate including but not limited to Contract Wage Determination education and certifications relevant work experience related skills and competencies as well as Federal Government Contract Labor Categories. Central to Watermarks employment philosophy is the wellbeing of our employees which is why we offer a robust benefits package and wellness program alongside of annual base compensation.
Watermark Risk Management International LLC is anequalopportunity andaffirmativeactionemployerand does not discriminateon the basis ofrace color religion sex (including pregnancy and gender identity) national origin political affiliation sexual orientation marital status disability genetic information age membership in an employee organization retaliation parental status military service or other nonmerit factors.
Watermark Risk Management International LLC is a federal contractor and is therefore subject to any federal vaccine mandates or other customer vaccination requirements.
Required Experience:
Senior IC
Full-Time