Job Description
Job Description
gTANGIBLE Corporation (gTC), www.gtangible.com, is a S corporation and a registered Government contractor that provides services and solutions in :
- National Security Programs
- Professional, Administrative, and Management Support
- Mission and Warfighter Support
We are a Service Disabled Veteran Owned Small Business (SDVOSB) and the founder has years of successful experience in the Government contracting arena.
Our leadership team is an exceptional group of Government contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position :
Requisition Type : Open
Position Title : Security Control Assessor (SCA) I
The Air Force (AF) Special Access Program (SAP) Security Support Services (SSS) assists the AF cognizant security authority in oversight of enhanced National Security Objectives supporting AF SAP interests through active and integrated security operations, processes, mechanisms, and management.
This support provides multi- disciplinary security support, including specialized analytical / program protection support, while being responsive and flexible to dynamic SAP security situations.
The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.
e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome
with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities.
Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer's area of responsibility.
Location : Westlake, TX
Security Clearance Level : Top Secret / SCI, SAP Information eligible, consent for Counterintelligence polygraph
Duties and Responsibilities
- Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure.
- Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG).
- Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and / or Authorizing Official (DAO / AO) on any assessment and authorization issues.
- Evaluate Authorization packages and make recommendation to the AO and / or DAO for authorization.
- Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required.
- Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system.
- Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary.
- Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR.
- Evaluate security assessment documentation and provide written recommendations for security authorization to the Government.
- Discuss recommendation for authorization and submit the security authorization package to the AO / DAO.
- Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.
- Review and concur with all sanitization and clearing procedures in accordance with Government guidance and / or policy.
- Assist the Government compliance inspections.
- Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken.
- Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC).
- Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries.
- Evaluate the effectiveness and implementation of Continuous Monitoring Plans.
- Represent the customer on inspection teams.
Knowledge and Qualifications
- Bachelor's degree in a related discipline or equivalent experience (4 years).
- 5-7 years related experience.
- Prior performance in the role of ISSO and ISSM.
- Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level I within 6 months of the date of hire.
- Minimum of three (3) years' experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
- Must be able to regularly lift up to 50 lbs.
- Prior active duty in the U.S. Air Force a plus.
gTANGIBLE Corporation is an equal opportunity employer and does not discriminate against any employee or applicant because of race, age, sex, color, physical or mental disability, religion, sexual orientation, marital status, national origin, or political affiliation.