InformationAssurance Security Specialist - Audit Support Services This position requires an active TS/Sensitive Compartmental Information (SCI) clearance. Criterion Systems is seeking an InformationAssurance Security Specialist to provide audit support that manages NGA's preparation for, execution of, and response to … external cyber audits such as Command Cyber Operational Readiness Inspection (CCORI), Command Cyber Readiness Inspection (CCRI), Cybersecurity Service Provider (CSSP), Federal Information Systems Controls Audit Manual (FISCAM) audits. Compensation & Benefits: Pay commensurate with experience. Full time benefits include Medical, Dental, Vision, 401K, and other possible benefits as provided. Benefits … are subject to change with or without notice. InformationAssurance Security Specialist - Audit Support Services Responsibilities Include: Ensure the Cybersecurity Operation Cell (CSOC) is prepared to successfully pass inspections and audits at all times; this includes but is not limited to identifying the audit criteria for CCRI More ❯
match, generous PTO accrual, professional development reimbursement, corporate-funded technology certifications, and robust employee recognition and appreciation programs. We are seeking a highly skilled InformationAssurance Systems/Network Specialist to work in Washington DC. Job Summary: Responsible The contractor shall provide assessment and authorization (A&A … and technical cyber security support to the System Owner (SO) to include, but not limited to: Determines enterprise informationassurance and security standards. Develops and implements informationassurance and security standards and procedures. Coordinates, develops, and evaluates security programs for an organization. Recommends informationassurance and security solutions to support customer's requirements. Identifies, reports, and resolves security violations. Establishes and satisfies informationassurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports customers at the highest levels in the development and implementation of doctrine and More ❯
Job Title: InformationAssuranceSpecialist Location(s): Arlington, VA and Washington DC Salary: $55,000 - $85,000 Hours: Full-Time (On-site) Clearance Requirements: Top Secret required Background: The Foreign Service Institute (FSI) provides training to employees of the Department of State and other Foreign affairs agencies … in sixty-five foreign languages, regional area studies, and professional disciplines, including economics, political science, information management, and management skills, among others. FSI is exploring alternatives to traditional face-to-face instruction and integrating Educational Technology in an effort to maximize the effectiveness, efficiency, and availability of training. FSI … s Office of Management Information Systems (FSI/EX/OMIS) has comprehensive responsibilities for the operations and maintenance of FSI's internal computer networks and communication systems, and application of the systems to meet both internal FSI needs and the data needs of other Bureaus. Responsibilities: Conduct vulnerability More ❯
contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position. Requisition Type: Contingent - Open Position Status: Full Time Position Title: Information Technology/AssuranceSpecialist II Location: Colorado Springs, CO Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for … Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Duties include the following: Establish complex operational software configuration controls and system interfaces for computer system(s … and cyber security coordination on all Bodies of Evidence that make- up the authorization package. Identify any and all vulnerabilities and implement countermeasures. Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices. Perform Video-Teleconferencing VTC System Administration, Scheduling More ❯
contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position. Requisition Type: Contingent - Open Position Status: Full Time Position Title: Information Technology/AssuranceSpecialist II Location: San Antonio, TX Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for … Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Duties include the following: Establish complex operational software configuration controls and system interfaces for computer system(s … and cyber security coordination on all Bodies of Evidence that make- up the authorization package. Identify any and all vulnerabilities and implement countermeasures. Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices. Perform Video-Teleconferencing VTC System Administration, Scheduling More ❯
systems engineering. We invite you to join the small business team where you can build, innovate, and secure your career. Sentar is seeking a InformationAssurance/Security Specialist Level II Engineer III Role Description: The InformationAssurance/Security Specialist Level II will … for system security practices within the Defense Health Agency (DHA) under the Global Service Provider (GSP) contract. This role requires a comprehensive understanding of InformationAssurance (IA) and cybersecurity frameworks to assist in developing, assessing, and maintaining security documentation, ensuring that systems gain and retain the necessary Authority … to Operate (ATO). Responsibilities: Assist with Security Accreditation: - Work with system owners and Information System Security Officers (ISSO) to develop and maintain Certification & Accreditation (C&A) documentation. - Help facilitate the process of achieving and maintaining an Authority to Operate (ATO). Compliance & Governance: - Follow NIST and/or More ❯
What You'll Be Working On: ️ Managing and enforcing information security policies, procedures, and standards to safeguard organizational data ️ Conducting risk assessments and ensuring compliance with relevant security frameworks (e.g., ISO 27001, NIST, GDPR) ️ Performing audits and security assessments to identify vulnerabilities and recommending appropriate mitigations ️ Collaborating with other … teams to implement and maintain secure information management systems ️ Providing expert guidance on data classification, encryption, and access controls to maintain the integrity and confidentiality of sensitive data What We're Looking For: ️ Proven experience as an InformationAssuranceSpecialist or in a similar role focused … on data protection and compliance ️ Strong understanding of informationassurance frameworks (e.g., ISO 27001, NIST SP 800-53, COBIT) ️ Experience with security assessments, audits, and vulnerability management ️ Knowledge of regulatory standards such as GDPR, HIPAA, and PCI-DSS ️ Certifications such as CISSP, CISM, or ISO 27001 Lead Implementer More ❯
Corporation delivers the most advanced protection and secrecy solutions to secure and strengthen critical missions, programs, operations, and intelligence activities. We are seeking an Information Technology/AssuranceSpecialist I to join our team to help contribute to our success and help us solve problems with innovation … Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Duties include, but not limited to: Establish complex operational software configuration controls and system interfaces for computer … and cyber security coordination on all Bodies of Evidence that make- up the authorization package Identify any and all vulnerabilities and implement countermeasures Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices Perform Video-Teleconferencing VTC System Administration, Scheduling More ❯
Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: • Establish complex operational software configuration controls and system interfaces for computer system(s) assigned … and cyber security coordination on all Bodies of Evidence that make- up the authorization package • Identify any and all vulnerabilities and implement countermeasures • Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices • Perform Video-Teleconferencing VTC System Administration, Scheduling … Configuration • Provide External Information System(s) Client Support • Perform account creations, changes, & deletions on multiple authorization boundaries • Perform Help Desk & troubleshooting actives • Perform Hardware/Software System Configuration, upgrades and modifications • Perform system and network appliance patching actives • Provide Gov-Issue Laptop Support • Assist in Media Control & Accountability actives More ❯
ALTA IT has a Contract to Hire position open for an InformationAssurance/Security Specialist. Active TS/SCI Clearance Onsite - Springfield, VA InformationAssurance/Security Specialist IV: Reporting directly to the Chief for Cyber Readiness, you will provide audit support that manages … and response to external cyber audits such as Command Cyber Operational Readiness Inspection (CCORI), Command Cyber Readiness Inspection (CCRI), Cybersecurity Service Provider (CSSP), Federal Information Security Management Act (FISMA), and Federal Information Systems Controls Audit Manual (FISCAM) audits. This includes, but is not limited to, aggregating documents and … religion, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, age, national origin, disability, family care or medical leave status, genetic information, veteran status, marital status, or any other characteristic protected by applicable federal, state, or local law. More ❯
Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to- day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: • Establish complex operational software configuration controls and system interfaces for computer system(s) assigned … and cyber security coordination on all Bodies of Evidence that make-up the authorization package • Identify any and all vulnerabilities and implement countermeasures • Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices • Perform Video-Teleconferencing VTC System Administration, Scheduling … Configuration • Provide External Information System(s) Client Support • Perform account creations, changes, & deletions on multiple authorization boundaries • Perform Help Desk & troubleshooting activities • Perform Hardware/Software System Configuration, upgrades and modifications • Perform system and network appliance patching activities • Provide Government-Issued Laptop Support • Assist in Media Control & Accountability activities More ❯
Job Description Strategic ACI is seeking an on-site InformationAssurance (IA) Specialist specializing in RMF. The candidate will work as part of a small cybersecurity team. The candidate will manage DoD Risk Management Framework (RMF) processes and will need to be familiar with creating eMASS packages … status, partnership status, domestic violence victim status, sexual orientation, age, national origin, alienage or citizenship status, veteran or military status, disability, medical condition, genetic information, caregiver status, unemployment status or any other characteristic prohibited by federal, state and/or local laws. This policy applies to all aspects of More ❯
ATO. Asset where possible in completing POA&M activities. Requirements Ensure the effective implementation of DOE and NNSA cybersecurity policies and procedures for designated information systems, ensuring alignment with organizational security standards and best practices. Lead the Assessment and Authorization (A&A) activities for designated systems, ensuring compliance with … assessments to understand vulnerabilities and recommend mitigation strategies to ensure system integrity. Lead and conduct cybersecurity tests and assessments, providing actionable results to the Information System Security Manager (ISSM). Address vulnerabilities and provide guidance for remediation. Evaluate the security impact of proposed changes to assigned information systems. … exercises to ensure readiness in case of security incidents. Effectively communicate cybersecurity status, risks, and mitigation strategies to stakeholders, both formally and informally. Present information clearly in group and individual settings to ensure understanding across all levels of the organization. Key Candidate Traits: In-depth knowledge of DOE and More ❯