Responsibilities
We are seeking an experienced Security Control Assessor Representative to accomplish the following:
- Conduct assessments and facilitate risk mitigation planning.
- Provide Assessment and Authorization (A&A) for the ARCYBER cloud infrastructure.
- Execute a security control assessment plan and update the System Security Plan.
- Review vulnerability scans and remediation.
- Implement risk management programs by utilizing NIST FISMA HIPAA and PII -- and document solutions.
- Monitor the privacy landscape regarding all data (privacy protection classification and residency).
- Assist clients with identifying gaps within existing privacy programs and designing solutions to help address those challenges.
- Scan test and validate systems/networks/applications to obtain/maintain an ATO under NIST/FISMA guidelines.
*This position requires full-time onsite attendance Monday through Friday in the Baltimore metropolitan area.
Qualifications
Required Qualifications:
- Education: Bachelors degree and 8 years of experience or Masters and 6 years of experience or PhD and 3 years of experience. A degree in one of the following fields of study is highly desired: Information Technology Computer Science Cybersecurity Information Systems Software Engineering or Data Science. However an additional 4 years of relevant experience or specialized training may be considered in lieu of Bachelors degree.
- Security Clearance: Active Top Secret with SCI eligibility.
- Certifications: Active IAT Level II certification (CompTIA Security preferred).
- Must have knowledge of enterprise solutions across multiple cloud operating environments (JWICS SIPRNET NIPRNET and commercial Internet).
- Must have eMASS ACAS and ISC2 Certified Cloud Computing Professional (CCSP) or CompTIA Cloud experience.
- Must have knowledge in the following areas:
- Knowledge of computer networking and/or cloud computing concepts and protocols and network security methodologies.
- Knowledge of cyber threats and vulnerabilities in a virtualized environment.
- Knowledge of national and international laws regulations policies and ethics as they relate to cybersecurity.
- Knowledge of risk management framework processes (e.g. methods for assessing and mitigating risk).
- Knowledge of specific operational impacts of cybersecurity lapses.
- Knowledge of industry methods for evaluating implementing and disseminating Information Technology (IT) security assessment monitoring detection and remediation tools and procedures using standards-based concepts and capabilities.
- Knowledge of cyber defense and vulnerability assessment tools including opensource tools and their capabilities.
- Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality integrity availability authentication non-repudiation).
- Knowledge of cybersecurity principles used to manage risks related to the use processing storage and transmission of information or data in a cloud environment.
- Knowledge of IT and cloud computing security principles and methods (e.g. firewalls demilitarized zones encryption).
- Knowledge of known vulnerabilities from alerts advisories errata and bulletins.
- Knowledge of network and/or cloud computing environment security architecture concepts including topology protocols components and principles (e.g. application of defense-in-depth).
- Knowledge of penetration testing principles tools and techniques..
- Knowledge of system and application security threats and vulnerabilities (e.g. buffer overflow mobile code cross-site scripting Procedural Language/Structured Query Language PL/SQL and injections race conditions covert channel replay return oriented attacks malicious code).
- Knowledge of the Security Assessment and Authorization process.
- Skill in determining how a security and/or cloud computing security system should work (including its resilience and dependability capabilities) and how changes in conditions operations or the environment will affect these outcomes.
- Skill in discerning the protection needs (i.e. security controls) of information systems and networks and those relating to cloud computing.
- Knowledge of local specialized system requirements (e.g. critical infrastructure systems that may not use standard IT) for safety performance and reliability.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider we deliver trusted highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land sea space air and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day our employees do the cant be done by solving the most daunting challenges facing our customers. Visit to learn how were keeping people around the world safe and secure.
Target Salary Range
$135000 - $216000. This represents the typical salary range for this position. Salary is determined by various factors including but not limited to the scope and responsibilities of the position the individuals experience education knowledge skills and competencies as well as geographic location and business and contract considerations. Depending on the position employees may be eligible for overtime shift differential and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer including disability and protected veterans or other characteristics protected by law.
Required Experience:
Unclear Seniority
ResponsibilitiesWe are seeking an experienced Security Control Assessor Representative to accomplish the following:Conduct assessments and facilitate risk mitigation planning.Provide Assessment and Authorization (A&A) for the ARCYBER cloud infrastructure.Execute a security control assessment plan an...
Responsibilities
We are seeking an experienced Security Control Assessor Representative to accomplish the following:
- Conduct assessments and facilitate risk mitigation planning.
- Provide Assessment and Authorization (A&A) for the ARCYBER cloud infrastructure.
- Execute a security control assessment plan and update the System Security Plan.
- Review vulnerability scans and remediation.
- Implement risk management programs by utilizing NIST FISMA HIPAA and PII -- and document solutions.
- Monitor the privacy landscape regarding all data (privacy protection classification and residency).
- Assist clients with identifying gaps within existing privacy programs and designing solutions to help address those challenges.
- Scan test and validate systems/networks/applications to obtain/maintain an ATO under NIST/FISMA guidelines.
*This position requires full-time onsite attendance Monday through Friday in the Baltimore metropolitan area.
Qualifications
Required Qualifications:
- Education: Bachelors degree and 8 years of experience or Masters and 6 years of experience or PhD and 3 years of experience. A degree in one of the following fields of study is highly desired: Information Technology Computer Science Cybersecurity Information Systems Software Engineering or Data Science. However an additional 4 years of relevant experience or specialized training may be considered in lieu of Bachelors degree.
- Security Clearance: Active Top Secret with SCI eligibility.
- Certifications: Active IAT Level II certification (CompTIA Security preferred).
- Must have knowledge of enterprise solutions across multiple cloud operating environments (JWICS SIPRNET NIPRNET and commercial Internet).
- Must have eMASS ACAS and ISC2 Certified Cloud Computing Professional (CCSP) or CompTIA Cloud experience.
- Must have knowledge in the following areas:
- Knowledge of computer networking and/or cloud computing concepts and protocols and network security methodologies.
- Knowledge of cyber threats and vulnerabilities in a virtualized environment.
- Knowledge of national and international laws regulations policies and ethics as they relate to cybersecurity.
- Knowledge of risk management framework processes (e.g. methods for assessing and mitigating risk).
- Knowledge of specific operational impacts of cybersecurity lapses.
- Knowledge of industry methods for evaluating implementing and disseminating Information Technology (IT) security assessment monitoring detection and remediation tools and procedures using standards-based concepts and capabilities.
- Knowledge of cyber defense and vulnerability assessment tools including opensource tools and their capabilities.
- Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality integrity availability authentication non-repudiation).
- Knowledge of cybersecurity principles used to manage risks related to the use processing storage and transmission of information or data in a cloud environment.
- Knowledge of IT and cloud computing security principles and methods (e.g. firewalls demilitarized zones encryption).
- Knowledge of known vulnerabilities from alerts advisories errata and bulletins.
- Knowledge of network and/or cloud computing environment security architecture concepts including topology protocols components and principles (e.g. application of defense-in-depth).
- Knowledge of penetration testing principles tools and techniques..
- Knowledge of system and application security threats and vulnerabilities (e.g. buffer overflow mobile code cross-site scripting Procedural Language/Structured Query Language PL/SQL and injections race conditions covert channel replay return oriented attacks malicious code).
- Knowledge of the Security Assessment and Authorization process.
- Skill in determining how a security and/or cloud computing security system should work (including its resilience and dependability capabilities) and how changes in conditions operations or the environment will affect these outcomes.
- Skill in discerning the protection needs (i.e. security controls) of information systems and networks and those relating to cloud computing.
- Knowledge of local specialized system requirements (e.g. critical infrastructure systems that may not use standard IT) for safety performance and reliability.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider we deliver trusted highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land sea space air and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day our employees do the cant be done by solving the most daunting challenges facing our customers. Visit to learn how were keeping people around the world safe and secure.
Target Salary Range
$135000 - $216000. This represents the typical salary range for this position. Salary is determined by various factors including but not limited to the scope and responsibilities of the position the individuals experience education knowledge skills and competencies as well as geographic location and business and contract considerations. Depending on the position employees may be eligible for overtime shift differential and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer including disability and protected veterans or other characteristics protected by law.
Required Experience:
Unclear Seniority
View more
View less