Burke, Virginia, United States Hybrid / WFH Options
ALTA IT Services
for performance metrics, compliance monitoring, and capacity planning. • Assist in the implementation of network segmentation and zero-trust architectures using LiveAction insights. • Support accreditation and compliance efforts including RMF, FISMA, FedRAMP, and DoD standards. • Train and mentor operations staff and develop documentation for standard operating procedures. • Provide Tier 2/3 support for incident response and troubleshooting. Required Qualifications: • Active More ❯
including NIST AI RMF, OECD AI Principles, and ISO/IEC 42001; able to assess systems for fairness, bias, and explainability. Familiarity with cybersecurity compliance frameworks (e.g., NIST RMF, FISMA, CMMC) and integration of AI systems into secure, audit-ready environments. Proficient in machine learning techniques (supervised, unsupervised, reinforcement learning) and deep learning architectures (CNNs, RNNs, Transformers). Strong in More ❯
Kubernetes. Familiarity with Service-Oriented Architecture (SOA) orMicroservices. RESTful API development experience. Knowledge of performance optimization techniques in development and coding. Understanding offederal standards for software development (e.g., FISMA, NIST). More ❯
years of directly relevant experience in cyber incident management or cybersecurity operations Knowledge of incident response and handling methodologies Having close familiarity with NIST 800-62 (latest revision), and FISMA standards as they pertain to reporting incidents. Knowledge of the NCCIC National Cyber Incident Scoring System to be able to prioritize triaging of incident Knowledge of general attack stages (e.g. More ❯
years of directly relevant experience in cyber incident management or cybersecurity operations Knowledge of incident response and handling methodologies Having close familiarity with NIST 800-62 (latest revision), and FISMA standards as they pertain to reporting incidents. Knowledge of the NCCIC National Cyber Incident Scoring System to be able to prioritize triaging of incident Knowledge of general attack stages (e.g. More ❯
in federal systems. - Technical Expertise: Expert knowledge of tools like Tenable Security Center, BigFix, JAMF, and Splunk for real-time monitoring and compliance management. Familiar with DoD RMF and FISMA cybersecurity standards. - Leadership: Proven ability to lead vulnerability management teams, implement security controls, and develop incident response strategies. Experience conducting security assessments and ensuring compliance with federal cybersecurity regulations. More ❯
packet disassembly, routing, switching), ability to perform diagnostics, and knowledge ofsecurity best practices Experience with compliance controls and security hardening for a US Government computer system at the FISMA Moderate or High levels. Advanced automation skills in bash shell scripting, python, curl, etc Multiple years of cross domain experience in IT domains such as network administration, database administration, or More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
legacy systems to IBM hybrid cloud platforms. • Implement DevSecOps practices leveraging IBM Cloud tooling. • Partner with federal stakeholders to ensure solutions align with mission objectives. • Maintain compliance with FedRAMP, FISMA, and agency-specific security protocols. Qualifications • Bachelor's degree in Computer Science, Engineering, or related field. • 5+ years of experience with IBM Cloud technologies. • Strong proficiency with Kubernetes, OpenShift, and More ❯
Demonstrated experience with the Extract, Transform, and Load (ETL) processes. Demonstrated experience managing and mitigating IT security vulnerabilities using Plans of Actions and Milestones (POAMs). Demonstrated experience applying FISMAsecurity controls. Demonstrated experience documenting and communicating technical and non-technical mission requirements for all audiences. Demonstrated experience working collaboratively with other technical teams across multiple organizational boundaries. Desired Software More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯