sata-intelligence

Cyber Security/Information Assurance Engineer/Technician

Data Intelligence Technologies - Herndon, VA

Cyber Security/Information Assurance Engineer/Technician

The Cyber Security/Information Assurance Engineer/Technician will function as a Security Control Assessor (SCA) following National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 and or 800-53A Revision 4 guidance and or procedures to conduct a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by complex and diverse information systems to determine the overall effectiveness of the control implementation. The goal is to determine the extent to which the assigned security controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the regulatory and or statutory security requirements for National Security Systems.

The candidate will perform the following tasks and or participate in the following activities as part of their role as a SCA:

  • Evaluate Government customer systems against NIST SP 800 53/53A R4, 30, 37 and 39, RMF and other security standards and publications as well as Government customer defined security guidelines and regulations. Utilizing the customer assessment tracking system, Xacta-360. Function as an independent and unbiased advocate who provides evidence to validate the trustworthiness of the system for the designated Authorizing Official (AO).
  • Conduct hands-on security control testing, analyze Body of Evidence (BoE) documentation and test results, document risk and recommend countermeasures.
  • Provide an assessment of the severity of weakens or deficiencies discovered in the information system and its environment of operation and recommend corrective actions to address identified vulnerabilities.
  • Conduct hands-on security testing leveraging commercial tools and custom developed scripts and procedures.
  • Execute vulnerability/compliance assessment tools and evaluate results for systems undergoing security assessment.
  • Participate in joint test teams with other customer organizations and or Government Agencies to complete security assessment and adjudication.
  • Coordinate with other program elements conducting security testing.
  • Actively participate in or lead technical exchange meetings and application review boards, documenting actions items/results of these events.
  • Brief management, as needed, on the status of action items and/or results of activities.
  • Prepare security assessment reports containing the results and findings form the assigned security control assessments.
  • Provide documentation to the customer which describes all identified system risks, planned test procedures taken and test results.
  • Provide enhancement capabilities and SOPs to assessment operations for execution and implementation.
  • Maintain accountability to ensure integrity and confidentiality of the process.
  • Responsible for implementing and applying technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
  • Investigates network device and information security incidents to determine extent of compromise to national security information and automated information systems.

Desired Skills/Certifications:

  • Familiarity with conducting security assessment in support of accreditation and or authorization (A&A) decisions.
  • Familiarity with National Institute of Standards and Technology (NIST) Cybersecurity Framework and National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) requirements.
  • Familiarity with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 and or 800-53A Revision 4 as well as 800-30, 37 and 39.
  • Familiarity with the Committee on National Security Systems (CNSS) Instruction No. 1253.
  • Knowledge of Federal laws, regulations, policies, and ethics as they relate to cybersecurity.
  • Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities.
  • Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data.
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of specific operational impacts of cybersecurity lapses.
  • Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities.
  • Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
  • Knowledge of cyber threats and known vulnerabilities from alerts, advisories, errata, and bulletins.
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Skill in discerning the protection needs (i.e., security controls) of information systems and other computing environments.
  • CompTIA Security+
  • GIAC Security Essentials (GSEC)
  • Certified Information Systems Security Professional (CISSP)
  • Ability to write technical reports and conduct briefings.


Posted On: Tuesday, June 29, 2021



Apply to this job
  • Pre - Screen Questionnaire (FSP)
  • *
  • *
  • *
  • *
  • *
  • *