Talent.com
TA7 - 10R INFORMATION ASSURANCE SENIOR SECURITY SPECIALIST ASSESSMENT
TA7 - 10R INFORMATION ASSURANCE SENIOR SECURITY SPECIALIST ASSESSMENTSoftek International Inc • Piscataway, NJ, US
TA7 - 10R INFORMATION ASSURANCE SENIOR SECURITY SPECIALIST ASSESSMENT

TA7 - 10R INFORMATION ASSURANCE SENIOR SECURITY SPECIALIST ASSESSMENT

Softek International Inc • Piscataway, NJ, US
job_description.job_card.30_days_ago
serp_jobs.job_preview.job_type
  • serp_jobs.job_card.full_time
job_description.job_card.job_description

Job Description

Job Description

Description :

Support in identifying cybersecurity deficiencies in information systems by performing technical assessments of assigned systems and applications to determine the severity of weaknesses; Supports the Security Authorization (SA) and Continuous Monitoring (CM), Risk Management Framework (RMF) process. Results of the assessments will be documented in the MGMT compliance tool, (e.g., IACS, CSAM, etc.), utilizing a standard report format with the results and findings from the assessment, along with recommended mitigations. Results will also be entered into the compliance tool. The contract team perform the following tasks :

Duties / Responsibilities :

  • Create, manage, and utilize Assessment Standard Operating Procedures and Testing Templates and ensure that assessments are conducted accurately, efficiently, and consistently.
  • Create, manage, and utilize Assessment Guides and Training Material documents that assist system stakeholders in preparing for upcoming assessments. Includes, but is not limited to Frequently Asked Question guides, workflows, and Training Materials.
  • Create, manage, and utilize Check-Point Reviews to determine the readiness of the system for assessments. Includes the status of POA&Ms for the system, review of control implementations for applicability and the state of the Body of Evidence (BOE) materials to support the assessment.
  • Manage Assessment Entrance Conference Briefing, creating agenda and meeting minutes for the system stakeholders on what to expect and when during the upcoming assessments.
  • Draft Security Assessment Report (SAR) for review by the stakeholders to prepare for the Exit Conference.
  • Manage Assessment Exit Conference Briefing, creating agenda and meeting minutes for the system stakeholders on the results of the Exit conference to determine the final SAR.
  • Create Final Security Assessment Report for review by the stakeholders to prepare for the Exit Conference.
  • Develop and maintain an overall Security Assessment Schedule that forecasts system assignments for contractor and stakeholder staff over the period of performance. The Assessment schedule needs to include assessments that meet the requirements of current DHS policy. Systems in Ongoing Authorization (OA) need to be assessed once a year. Systems not in the OA program need to be assessed at a minimum every three years or when a major change occurs. The schedule also needs to support new systems utilizing the Authority to Proceed (ATP) memo. New systems utilizing the ATP process assess the critical controls prior to being placed in production and then require a full assessment within one year after receiving the ATP.
  • Develop testing artifacts for each system to include, as appropriate, the technical assessment plan, the Rules of Engagement (ROE), the Security Requirements Traceability Matrix (SRTM), the Security Assessment Report, and any other necessary documentation.
  • Update and maintain all testing templates and Standard Operating Procedures (SOP) as needed, or on an annual basis per DHS guidelines, to include the utilization of the compliance tool.
  • Create Assessment Guides to assist ISSOs, ISSMs, System Owners and other stakeholders to prepare for upcoming assessments. This includes but is not limited to Frequently Asked Questions (FAQs) guides, and Training Materials.
  • Conduct and / or review vulnerability scans, review device configurations, and review system architecture. The Contractor will utilize vulnerability assessment tools as provided by the government. Test tools used to support the assessment process may include but is not limited to Nessus (Vulnerability Scanner), WebInspect (performs web application security testing and assessment), IACS, CSAM, and AppDetective (database vulnerability scanner). These tools are subject to change.
  • Provide advisement and recommendations to the Government for assessment and security best practices including tools that are used for assessment activities.
  • Arrange for physical access to the system, if applicable, with the specific System Owner and the specific facility manager(s). All contact information will be provided by the system’s Information System Security Officer (ISSO). Alternatives to physical access to the system may be utilized if it does not compromise the assessment of the controls needed to be accomplished.
  • Conduct an Assessment Kick-off meeting according to the Security Assessment Schedule that reviews the MGMT Compliance requirements, process, and artifacts to prepare the stakeholders for the scheduled assessment.
  • Conduct up to two check point reviews after the kickoff, and prior to the planned assessment date to review the status of the artifacts in the compliance tool. Provide the checkpoint information to the assessment division and conduct reviews with the stakeholders as needed. As part of the check point review, the assessor will provide detailed criteria that would result in significant findings on the assessment or prevent the assessors from conducting an accurate assessment.
  • Conduct an assessment entrance conference according to the Security Assessment Schedule that does a final overview of what is expected during the assessment.
  • Execute the assessment through the review of system security documentation, vulnerability scan results, audit logs, configuration guides, and any other additional materials provided by the system and system stakeholders.
  • Document the results of the technical assessments in the draft Security Assessment Report (SAR) with the criteria of the tests, testing methods, findings of the assessment and recommended mitigations. The draft SAR will be sent to the stakeholders one week prior the exit conference as defined in the Security Assessment Schedule.
  • Conduct an assessment exit conference according to the Security Assessment Schedule to review of the findings of the draft SAR and address any final agreed changes.
  • Based on the results of the exit conference, produce the Final SAR within 5 business days of the conference. The Final SAR will document the results of the technical assessments with the criteria of the tests, testing methods, findings of the assessment and recommended mitigations.
  • Collect and securely store all final materials and media submitted by the system test team according to the SOP in the DHS compliance system. Draft systems assessment may use other DHS MGMT owned systems as appropriate.

Requirements :

Experience : (MUST HAVE) :

  • At least 4 years of NIST Security Control Assessor (SCA) experience.
  • Must have led Assessment teams from planning through execution and finalization an of assessment.
  • Capable of performing in a fast-paced environment.
  • Strong communication skills both verbally and in written form.
  • Mastery of control assessment requirements based on the NIST 800-53A.
  • Technical expertise in assessing environments such as but not limited to Applications, Operating Systems, Databases, Appliances, Cloud Environments, and Physical environments to validate a full deployment of a defense in depth strategy. ??
  • In depth understanding on how to read Nessus scan reports and identifying security vulnerabilities, configuration settings, and security compliance. ???
  • Proficient technical writing skills developing control findings, detailed assessment reports, technical requests for the system engineers,?and other security assessment documentation.
  • Extensive experience conducting assessment interviews of system engineers, administrators, and other support personnel including demonstrations to accurately validate system configurations. ??
  • Work well within and leading teams with a positive attitude and can solve problems without supervision.
  • Deep knowledge of Security Control testing and validation on both technical and policy areas.
  • CSAM experience
  • Working knowledge of DHS 4300 Policy +
  • Experience / Years of Relevant Experience :

  • At least 1 year of Splunk experience or Splunk certification
  • Required Experience 8 years.
  • Education / Certificates :

  • Required Education bachelor’s degree in computer science or related field.
  • Certification CISSP, CISM, CRISC, or CSSP
  • Clearance :

  • Security Clearance Secret
  • serp_jobs.job_alerts.create_a_job

    Information Security • Piscataway, NJ, US

    Job_description.internal_linking.related_jobs
    ISMS Consultant

    ISMS Consultant

    VirtualVocations • Astoria, New York, United States
    serp_jobs.job_card.full_time
    A company is looking for an ISMS Consultant (w / m / d) to support their IT-Security team in the area of Information Security Management Systems (ISMS). Key Responsibilities Establish, implement, and ...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_variable_hours • serp_jobs.job_card.promoted • serp_jobs.job_card.new
    Senior Threat Intelligence Analyst

    Senior Threat Intelligence Analyst

    VirtualVocations • Hamilton, New Jersey, United States
    serp_jobs.job_card.full_time
    A company is looking for a Senior Threat Intelligence Analyst.Key Responsibilities Act as a threat intelligence subject matter expert in areas such as malware analysis, exploit / vulnerability anal...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_30 • serp_jobs.job_card.promoted
    Training Specialist

    Training Specialist

    VirtualVocations • Bronx, New York, United States
    serp_jobs.job_card.full_time
    A company is looking for a Training Specialist to support client education and security awareness initiatives.Key Responsibilities Prepare customized training decks for client-facing security ses...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_30 • serp_jobs.job_card.promoted
    Information Security Consultant

    Information Security Consultant

    VirtualVocations • Hamilton, New Jersey, United States
    serp_jobs.job_card.full_time
    A company is looking for an Information Security Consultant, Digital Forensics & Incident Response.Key Responsibilities Investigate various types of cyber security incidents Conduct detailed end...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_variable_hours • serp_jobs.job_card.promoted • serp_jobs.job_card.new
    Identity & Access Management Specialist

    Identity & Access Management Specialist

    VirtualVocations • Paterson, New Jersey, United States
    serp_jobs.job_card.full_time
    A company is looking for an Identity & Access Management Specialist to manage user lifecycles and ensure secure access to systems. Key Responsibilities Administer and maintain access security syst...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_variable_hours • serp_jobs.job_card.promoted • serp_jobs.job_card.new
    Information Security Manager

    Information Security Manager

    VirtualVocations • Bronx, New York, United States
    serp_jobs.job_card.full_time
    A company is looking for an Information Security Manager to oversee security operations and ensure compliance with federal standards. Key Responsibilities : Develop and implement security policies,...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_30 • serp_jobs.job_card.promoted
    Senior Security Compliance Engineer

    Senior Security Compliance Engineer

    VirtualVocations • Bronx, New York, United States
    serp_jobs.job_card.full_time
    Security Compliance Engineer to support regulatory, security, and risk compliance initiatives.Key Responsibilities Develop, implement, and maintain global compliance policies and procedures Cond...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_variable_hours • serp_jobs.job_card.promoted • serp_jobs.job_card.new
    Security Control Assessor

    Security Control Assessor

    VirtualVocations • Newark, New Jersey, United States
    serp_jobs.job_card.full_time
    A company is looking for a Security Control Assessor.Key Responsibilities Conduct comprehensive assessments of management, operational, and technical security controls Evaluate security controls...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_30 • serp_jobs.job_card.promoted
    Senior Governance Analyst

    Senior Governance Analyst

    VirtualVocations • Paterson, New Jersey, United States
    serp_jobs.job_card.full_time
    Governance Documentation Analyst, responsible for managing cybersecurity documentation projects and ensuring alignment with governance frameworks. Key Responsibilities Manage documentation project...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_30 • serp_jobs.job_card.promoted
    Sr. Information Security Analyst (Penetration Testing)

    Sr. Information Security Analyst (Penetration Testing)

    TEKsystems • New York, NY, United States
    serp_jobs.job_card.full_time
    New York City is looking for a Sr.Information Security Analyst with strong penetration testing experience.The Senior Information Security Analyst will be responsible for monitoring the Firm securit...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_variable_days • serp_jobs.job_card.promoted
    Senior Manager, Offensive Security

    Senior Manager, Offensive Security

    VirtualVocations • Yonkers, New York, United States
    serp_jobs.job_card.full_time
    Key Responsibilities Lead Red Team operations and development, mentoring less experienced staff Conduct assessments to identify vulnerabilities in software, systems, and networks Manage the Bug...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_variable_days • serp_jobs.job_card.promoted
    Senior Information Security Engineer

    Senior Information Security Engineer

    VirtualVocations • Bronx, New York, United States
    serp_jobs.job_card.full_time
    A company is looking for a Senior Information Security Engineer.Key Responsibilities Collaborate with business partners to achieve data protection goals Develop and implement data protection str...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_30 • serp_jobs.job_card.promoted
    Military Fellowship- Network Security Governance Analyst IV

    Military Fellowship- Network Security Governance Analyst IV

    Verizon • Basking Ridge, NJ, United States
    serp_jobs.job_card.full_time
    A place to share your ideas freely - even if they're daring or different.Where the true you can learn, grow, and thrive.At Verizon, we power and empower how people live, work and play by connecting...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_1_day • serp_jobs.job_card.promoted
    Security Solutions Architect

    Security Solutions Architect

    VirtualVocations • Bronx, New York, United States
    serp_jobs.job_card.full_time
    A company is looking for a Security Solutions Architect to join their Cyber Security Solutions Architecture team.Key Responsibilities Ensure completeness of security engagement requests and condu...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_30 • serp_jobs.job_card.promoted
    NIRT SOC Analyst

    NIRT SOC Analyst

    VirtualVocations • Elizabeth, New Jersey, United States
    serp_jobs.job_card.full_time
    A company is looking for a NIRT SOC Analyst - Junior / Mid.Key Responsibilities Review data and identify anomalies for further investigation Monitor security incidents and respond to potential thr...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_30 • serp_jobs.job_card.promoted
    Senior Manager, Information Security Office Consultant

    Senior Manager, Information Security Office Consultant

    Capital One • NEW YORK, New York, United States
    serp_jobs.job_card.full_time +1
    Senior Manager, Information Security Office Consultant.At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security.You are pragmatic and...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_1_day • serp_jobs.job_card.promoted
    Senior Manager, Information Security Office (ISO) Consultant

    Senior Manager, Information Security Office (ISO) Consultant

    Capital One • NEW YORK, New York, United States
    serp_jobs.job_card.full_time +1
    Senior Manager, Information Security Office (ISO) Consultant.At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security.You are pragmat...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_variable_days • serp_jobs.job_card.promoted
    Information Security Awareness Lead

    Information Security Awareness Lead

    VirtualVocations • Yonkers, New York, United States
    serp_jobs.job_card.full_time
    A company is looking for an Information Security Awareness Lead to design and deliver security awareness initiatives.Key Responsibilities Develop and execute a multi-year security awareness train...serp_jobs.internal_linking.show_more
    serp_jobs.last_updated.last_updated_30 • serp_jobs.job_card.promoted