System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous Monitoring of Authorized Systems Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation More ❯
years of directly relevant experience in cyber incident management or cybersecurity operations Knowledge of incident response and handling methodologies Having close familiarity with NIST 800-62 (latest revision), and FISMA standards as they pertain to reporting incidents. Knowledge of the NCCIC National Cyber Incident Scoring System to be able to prioritize triaging of incident Knowledge of general attack stages (e.g. More ❯
in federal systems. - Technical Expertise: Expert knowledge of tools like Tenable Security Center, BigFix, JAMF, and Splunk for real-time monitoring and compliance management. Familiar with DoD RMF and FISMA cybersecurity standards. - Leadership: Proven ability to lead vulnerability management teams, implement security controls, and develop incident response strategies. Experience conducting security assessments and ensuring compliance with federal cybersecurity regulations. More ❯
legacy systems to IBM hybrid cloud platforms. • Implement DevSecOps practices leveraging IBM Cloud tooling. • Partner with federal stakeholders to ensure solutions align with mission objectives. • Maintain compliance with FedRAMP, FISMA, and agency-specific security protocols. Qualifications • Bachelor's degree in Computer Science, Engineering, or related field. • 5+ years of experience with IBM Cloud technologies. • Strong proficiency with Kubernetes, OpenShift, and More ❯
Demonstrated experience with the Extract, Transform, and Load (ETL) processes. Demonstrated experience managing and mitigating IT security vulnerabilities using Plans of Actions and Milestones (POAMs). Demonstrated experience applying FISMAsecurity controls. Demonstrated experience documenting and communicating technical and non-technical mission requirements for all audiences. Demonstrated experience working collaboratively with other technical teams across multiple organizational boundaries. Desired Software More ❯
compliance with established standards. Collaborate with engineering teams to ensure system designs meet the Risk Management Framework (RMF) subsystem requirements, ensuring alignment with The FederalInformationSecurityManagementAct (FISMA) and DoD and Army cybersecurity policies and regulations. Support the design, development, and implementation of IA programs for identity and access management (IAM), Public Key Infrastructure (PKI), cyber situational awareness … on security implementation and management. Preferred Qualifications: Experience in developing and maintaining RMF documentation, including POA&M. Proficiency in IA tools and security scanning technologies. In-depth knowledge ofFISMA compliance requirements and Army cybersecurity frameworks. Top Secret clearance - Can hold up to a TS/SCI. More ❯
CERT alerts, and mitigate CAT 1/2/3 vulnerabilities.Compliance & Documentation: Maintain up-to-date security artifacts, plans, and policies as required under RMF, NIST SP 800-series, FISMA, and FedRAMP. Load documentation and scan data into the A&A Asset Manager. Facilitate FISMA-required annual reviews (e.g., Contingency Plans, Security Controls). Support system reauthorization activities, including … administration. Experience with IA tools and processes: STIGs, Nessus, SCAP, ACAS, vulnerability management. Demonstrated knowledge of: Windows Server/Client, RHEL, VMware Cybersecurity frameworks: RMF, NIST SP 800-53, FISMASecurity monitoring, firewall, and encryption toolsets. 3+ Years of Experience with a Master's Degree in Information Technology, Risk Management, Cybersecurity 5+ Years of Experience with a Bachelor's Degree More ❯
will provide leadership, oversight, and compliance expertise for all aspects ofInformation Assurance (IA) and IT security. This role ensures adherence to GSA CIO IT Security Policies, NIST requirements, FISMA, and other applicable federalsecurity regulations. The ISSO will work independently from the operations team, directly supporting the Program Manager and government stakeholders, while also delivering training and guidance to … is for a proposal that is in its early stages and this contract has not been awarded yet. Responsibilities Ensure compliance with GSA CIO IT Security Policies, NIST guidance, FISMA, and the e-Government Actof 2002. Lead and oversee the security Authorization and Accreditation (A&A) process for program systems. Implement and maintain continuous monitoring processes to ensure ongoing More ❯
system security documentation (SSPs, POA&Ms, PTAs, PIAs, CMPs, CPs and IRPs). • Extensive knowledge and experience with informationsecurity standards, policies and practices - NIST (800-53 rev4), FISCAM , FISMA, DOD, DCID, FBI, etc. • Ability to research and address informationsecurity issues as required, being an authority on the subject. • Proven ability to multi-task and deliver on-time with … degree required (B.S. degree may be substituted for 4 years of work experience, preferably in IT) plus 5 years of IT Security related experience (with min. 2 years ofFISMA experience). • 5+ years of experience serving as an ISSO at a cleared facility. • 7+ years of professional experience in cybersecurity or computer science related field. • 5+ years of experience More ❯
Interview Only Hybrid This role is responsible for monitoring, detecting, analyzing, and responding to security events, managing vulnerabilities, and ensuring compliance with federal, agency, and organizational security requirements (NIST, FISMA, IRS Pub 1075, CMS, SSA). The analyst will also support audit readiness, maintain the System Security Plan (SSP), and lead targeted security awareness initiatives. Required Qualifications Bachelor's degree … candidates with relevant State of Georgia Experience Hands-on experience with Splunk, CrowdStrike Falcon, and Tenable Nessus/Tenable.sc. Strong understanding of CUI protection requirements and compliance frameworks (NIST, FISMA, IRS Pub 1075, CMS, SSA). Experience with incident response, vulnerability management, and risk assessments. Strong analytical, documentation, and communication skills. Thanks/Regards More ❯
with five (5) business days thereafter. Provide installation and technical support for DHS CISPD and DHS HQ components regarding issues and data feed submissions and interfaces to the DHS FISMA Compliance Tool suite. Plan of Actions & Milestones (POA&M) Reporting. Provide weekly/monthly reports, meeting minutes, user feedback and propose process improvements accordingly to project PM. SKILLS: Provide support … with five (5) business days thereafter. Provide installation and technical support for DHS CISPD and DHS HQ components regarding issues and data feed submissions and interfaces to the DHS FISMA Compliance Tool suite. Plan of Actions & Milestones (POA&M) Reporting. Provide weekly/monthly reports, meeting minutes, user feedback and propose process improvements accordingly to project PM. SKILLS: Provide support More ❯
AWS CodePipeline • Experience applying design patterns (Singleton, Factory, DAO) and AOP for modular codebases • Strong background in security and compliance, including JWT, OAuth 2.0, Spring Security, and familiarity with FISMA/NIST standards • Testing experience, including GraphQL Tester for unit/integration testing and regression prevention • Experience working with CI/CD pipelines (GitLab CI or similar) • Ability to mentor … junior developers, fostering knowledge-sharing and team growth • Proven ability to deliver features in a fast-paced, collaborative federal environment Preferred Qualifications • Experience with federal projects or environments requiring FISMA/NIST compliance • Familiarity with AWS services beyond ECS/CodePipeline (e.g., RDS, Lambda, S3, CloudWatch) • Knowledge of DevOps practices and tools for monitoring, logging, and automated deployments • Background in More ❯