Responsible for the design, development, and implementation of both short and long-term solutions to organization and/or customer information technology needs through new and existing applications, system architecture, network systems, and applications infrastructure. Employees design, develop, implement, and oversee IT products including but not limited to hardware, software, and networks. Employees may install, configure, administer, upgrade, and maintain security for the organization and/or t... more details
Information Technology Security, Lead Associate
Job LocationsUS-DC-Washington
Requisition ID
2024-146101
Position Category
Cyber Security
Clearance
Secret
Sector
Citizen Security & Public Services
Responsibilities
Responsible for the design, development, and implementation of both short and long-term solutions to organization and/or customer information technology needs through new and existing applications, system architecture, network systems, and applications infrastructure. Employees design, develop, implement, and oversee IT products including but not limited to hardware, software, and networks. Employees may install, configure, administer, upgrade, and maintain security for the organization and/or the customers the organization supports.
Key Responsibilities:
Develop and grow existing and new team members to foster collaboration, career development, and a culture of ownership and accountability.
Provide ISSO support for USAID Business Service systems across all SDLC stages following NIST 800-37 RMF guidelines.
Provide continuous monitoring support, support SA&A activities, and maintain FISMA compliance for existing and new systems.
Develop and maintain System Security Plans (SSPs) and manage system Plan of Action and Milestones (POA&Ms).
Overlay and integrate the Risk Management Framework process into the USAID SDLC (Agile and Waterfall) framework following NIST 800-37 Guide for Applying the Risk Management Framework to the Federal Information System.
Perform or support activities defined in the NIST RMF to obtain and maintain FISMA compliance; work with the Inspector General (IG) auditing team in support of FISMA audit and RMF assessment teams in support of the SA&A process.
Identify continuous monitoring capabilities, security controls and/or documents that have not yet been developed or do not meet the specified (specification) security requirement, and work toward maturing these objectives within a timeframe agreed to with the SO and the CISO.
Provide input for the implementation statements to the Agency System ISSO and SO regarding overall infrastructure, platform, and application security control implementation, regarding the controls and documents identified in NIST SP 800-53 and NIST SP 800-37.
Provide input to system ISSOs for application-level SA&A documentation updates, including SSP, SAR, MOU, ISA, Contingency Plan, and Privacy Threat Analysis, and for the annual FISMA inventory and categorization.
Collaborate with the Agency’s SO to determine who has access to the system, types of privileges or access rights, and ensure that system users and support personnel receive the requisite security training.
Participate in Disaster Recovery testing per Contingency Plans maintained by ISSO and in the annual COOP plan.
Lead the development of the ISO Management Plan.
Maintain a mature IT cybersecurity practice across the program which includes:
Facilitating annual system reviews, including internal and 3rd party Control Assessments.
Ensuring compliance with IT Security policy and procedures.
Interfacing with IT Security personnel, including Security Control Assessors.
Reviewing and update program Security Plans and artifact deliverables.
Support new technologies transitioning and provide penetration testing services.
Conducting vulnerability scans and recognizing vulnerabilities in security systems
Coordinate, participate and remediate findings from penetration tests.
*Contingent on Contract Award*
Qualifications
Basic Qualification:
U.S. Citizen
An active SECRET or the ability to obtain a SECRET Clearance.
Bachelor’s degree with 5 – 7 years, master’s degree with 3 - 5 years, or PhD with 0 – 2 years; four (4) years of experience can be substituted in lieu of a bachelor’s degree.
Must hold a Certified Information Systems Security Professional (CISSP) certification.
Experience with effective policy, instruction, and development for Federal or DoD Information Security Programs.
Ability to correlate operational concepts and apply appropriate security measures to mitigate threats or vulnerabilities.
Experience with risk analysis and assessment determinations incorporating system/mission owner, and unique operational constraints.
Experience performing Security Control Assessments in accordance with NIST 800 guide series.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.
Target Salary Range
$86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.
Job Abstracts is an independent Job Search Engine. Job Abstracts is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Job Abstracts uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder. Job Abstracts does not have its members apply for a job on the jobabstracts.com website. Additionally, Job Abstracts may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.
We would like to take a second to Welcome You to Job Abstracts, the nation’s largest Pure Job Board. With over 3.1 million job listings from 15,000+ Companies & Organizations, we help job searchers find careers that match their interests. As an anonymous user, you have probably discovered how easy our system is to use. However, you have just scratched the surface of what we can offer.
We encourage you to Register so you can use our most powerful features: searching with multiple terms, setting up multiple locations, establishing favorite companies, and accessing your search history. If you find a job you like, you can apply directly for it, and then, keep notes on it. We will also keep a lookout for jobs that match your search terms and email you when we find something you may like.
You can register for free and the system is free to use. If you like our system so far, click on Register and unlock the power required by serious job searchers.
Any time you conduct a search, the system shows you job matches, ranked by their Relevance Score (RS).
The score is calculated by a proprietary algorithm that uses Intelligent Machine Learning.
The Relevance Score tells you how well the job opportunity matches your search term or terms.
When not logged in, the system is limited to one search term. Scores for single term matches are usually lower.
When you register, log in, and set up multiple terms prioritized by importance, the jobs found for you will receive a much higher Relevance Score.