Information Systems Security Representative

Job Description

Business Group Highlights Civilian, State and LocalPerspecta s Civilian,
State and Local segment partners with the U.S. Federal Civilian State and Local
governments to provide infrastructure services, business solutions, and digital
transformation services that help them achieve policy objectives and integrate
citizen-centric services.

Responsibilities Our task order provides on-site enterprise-wide technical and
administrative Security Assessment and Authorization (A&A) and Continuous
Monitoring (CM) support. The Information Systems Security Engineer (ISSE) uses
her/his expertise to perform scans in support of the risk mitigation efforts of
the broader ISSO team to achieve Authority to Operate status for client systems
and applications. General overview: Provides feedback to design engineers and
evaluates end-to-end systems and systems-oriented products through their entire
life cycle. Working as expert, conducts research and evaluates technical
performance of software products and overall segments and systems. Ensures
products and systems comply with requirements and government information
assurance and cyber security standards and practices through formal
verification methods. Verifies/validates systems with specific emphasis on
network operations and cyber warfare tactics, techniques, and procedures
focused on the threat to information networks. Assesses performance using
evaluation criteria and technical performance measures. Prepares assessments
and cyber threat profiles of current and planned products based on
sophisticated testing, research, and analysis. Participates in design reviews
of components (hardware and software) to ensure applicability to the current
system and traceability of requirements. Reviews test plans/procedures and
ensures they verify/validate the requirements. Develops and maintains
analytical procedures to meet changing requirements. Produces high-quality
papers, presentations, recommendations, and findings for senior US government
intelligence and operations officials.Our task order provides on-site technical
and administrative Security Assessment and Authorization (A&A) and Continuous
Monitoring (CM) support for the client enterprise wide. The Information Systems
Security Representative (ISSR) implements security control assessment
principles to review security requirements, verify implementation, and provide
mitigation recommendations throughout the Information Systems life cycle t
facilitate secure systems for A&A and Continuous Monitoring support. The ISSR
responsibilities include, but are not limited to: Serving as the Information
Assurance Section subject matter expert for the A&A and Continuous Monitoring
processes. Providing security requirements analysis of Information Systems (IS)
architectures and designs. Possess a strong understanding IS security controls/
requirements and have the ability to provide guidance to the System Owners and
System Teams and recommending implementation strategies. Identifying IS
vulnerabilities and recommending mitigation alternatives for POA&M items.
Reviewing IS security test results to identify weaknesses, technical flaws, and
vulnerabilities. Recommending technical process improvements for the A&A


BS 8-10, MS 6-8, PhD 3-5
5-6 years IA and InfoSec experience; which includes developing and reviewing
security concept of operations, systems security plans, security control
assessments, contingency plans, configuration management plans, incident
response plans, plan of actions and milestones, risk management plans,
vulnerability scanning, and/or vulnerability management plans
Five years security control assessment experience; which includes systems A&A
principles, requirements analysis, system development (software and hardware);
network security architecture concepts (topology, protocols, components); and/
or IT security principles and methods (firewalls, demilitarized zones,
Experience with FISMA and RMF/A&A processes
Experience with NIST SP (800-27, 30, 37, 53, 60, 137, 144, 145), FIPS (199,
200), CNSSI 1253 experience
CISSP (required) and CISM or GSLC; or, ability to obtain CISM or GSLC within 6
months of hire
Active Top Secret clearance, periodic review (PR) performed within the past
three years, SCI eligibility Preferred:Knowledge of systems engineering
principles, requirements analysis, system development (software and hardware);
network security architecture concepts (topology, protocols, components); and/
or IT security principles and methods (firewalls, demilitarized
zones)Government consulting experienceKnowledge of CSA guidanceExperience with

About PerspectaWhat matters to our nation, is what matters to us. At Perspecta,
everything we do, from conducting innovative research to cultivating strong
relationships, supports one imperative: ensuring that your work succeeds.

Our company was formed to bring a broad array of capabilities to all parts of
the public sector from investigative services and IT strategy to systems wo
and next-generation engineering. Our promise is simple: never stop solving our
nation s most complex challenges. And with a workforce of approximately
14,000, more than 48 percent of which is cleared, we have been trusted to do
just that, as a partner of choice across the entire sector. Perspecta is an AA/
EEO Employer - Minorities/Women/Veterans/Disabled and other protected
categories. As a government contractor, Perspecta abides by the following
provision Pay Transparency Nondiscrimination Provision The contractor will not
discharge or in any other manner discriminate against employees or applicants
because they have inquired about, discussed, or disclosed their own pay or the
pay of another employee or applicant.

However, employees who have access to the compensation information of other
employees or applicants as a part of their essential job functions cannot
disclose the pay of the other employees or applicants to individuals who do not
otherwise have access to compensation information, unless the disclosure is (a)
in response to a formal complaint or charge, (b) in furtherance of an
investigation, proceeding, hearing, or action, including an investigation
conducted by the employer, or (c) consistent with the contractor s legal du
to furnish information. 41 CFR 60-1.35(c).
Show moreShow less

FindTheBestJob is a free service and does not charge a fee at any stage of application or recruitment process. Don’t provide your bank account or credit card details to anyone during job application. FindTheBestJob does not guarantee the availability of a job since organizations may end applications earlier than due date.

Apply Now