Security Controls Assessor I

ManTech (


  Full Time   Employee   Contractor

Barksdale AFB
United States

The SCA is
responsible for conducting a comprehensive assessment of the management,
operational, and technical security controls employed within or inherited by an
IS to determine the overall effectiveness of the controls (i.e., the extent to
which the controls are implemented correctly, operating as intended, and
producing the desired outcome with respect to meeting the security requirements
for the system). SCAs also provide an assessment of the severity of weaknesses
or deficiencies discovered in the IS and its environment of operation and
recommend corrective actions to address identified vulnerabilities. Responsibilities
will cover Collateral, Sensitive Compartment Information (SCI) and Special
Access Program (SAP) activities within the customer’s area of responsibility.

Duties may include:
(may be modified with concurrence of the Contracting Officer and the Contract
Program Manager)

<!--[if !supportLists]-->·
<!--[endif]-->Perform oversight of the development,
implementation and evaluation of information system security program policy;
special emphasis placed upon integration of existing SAP network infrastructure

<!--[if !supportLists]-->·
<!--[endif]-->Perform assessment of information systems, based
upon the Risk Management Framework (RMF) or the JAFAN 6/3 process

<!--[if !supportLists]-->·
<!--[endif]-->Advise the Authorizing Official (AO) and/or
Delegated Authorizing Official (DAO) on any assessment and authorization issues

<!--[if !supportLists]-->·
<!--[endif]-->Advise the Authorizing Official (AO), Delegated
Authorizing Official (DAO) and Program Security Officer (PSO) on assessment
methodologies and processes

<!--[if !supportLists]-->·
<!--[endif]-->Evaluate Authorization packages and make
recommendation to the AO and/or DAO for authorization

<!--[if !supportLists]-->·
<!--[endif]-->Evaluate Information system threats and
vulnerabilities to determine whether additional safeguards are required

<!--[if !supportLists]-->·
<!--[endif]-->Advise the ISO and PSO concerning the impact
levels for Confidentiality, Integrity, and Availability for the information on
a system

<!--[if !supportLists]-->·
<!--[endif]-->Evaluate threats and vulnerabilities to
information systems to ascertain the need for additional safeguards

<!--[if !supportLists]-->·
<!--[endif]-->Review and approve the information system
Security Assessment Plan, which is comprised of the SSP, the SCTM, and the
Security Control Assessment Procedures

<!--[if !supportLists]-->·
<!--[endif]-->Ensure security assessments are completed for
each IS

<!--[if !supportLists]-->·
<!--[endif]-->At the conclusion of each security assessment
activity, prepare the final Security Assessment Report (SAR) containing the
results and findings from the assessment

<!--[if !supportLists]-->·
<!--[endif]-->Initiate a POA&M with identified weaknesses
and suspense dates for each IS based on findings and recommendations from the

<!--[if !supportLists]-->·
<!--[endif]-->Evaluate security assessment documentation and
provide written recommendations for security authorization to the AO

<!--[if !supportLists]-->·
<!--[endif]-->Develop recommendation for authorization and
submit the security authorization package to the AO

<!--[if !supportLists]-->·
<!--[endif]-->Assess proposed changes to information systems,
their environment of operation, and mission needs that could affect system

<!--[if !supportLists]-->·
<!--[endif]-->Ensure approved procedures are in place for
clearing, purging, declassifying, and releasing information system memory,
media, and output

<!--[if !supportLists]-->·
<!--[endif]-->Assist in team and PSO compliance inspections

<!--[if !supportLists]-->·
<!--[endif]-->Assist the PSO’s with security incidents that
relate to cybersecurity and ensure that the proper and corrective measures have
been taken

<!--[if !supportLists]-->·
<!--[endif]-->Assess changes within the information system
boundary that could affect the authorization of the boundary

<!--[if !supportLists]-->·
<!--[endif]-->Ensure that Information systems requirements are
addressed during all phases of the system life cycle


<!--[if !supportLists]-->·
<!--[endif]-->7 – 9 years related

<!--[if !supportLists]-->·
<!--[endif]-->Minimum of four (4)
years experience in SAP and Collateral Information Systems (IS) Security and
the implementation of regulations identified in the description of duties.


<!--[if !supportLists]-->·
<!--[endif]-->Bachelors degree in a
related discipline or equivalent experience (4 years)


<!--[if !supportLists]-->·
<!--[endif]-->Must meet position and
certification requirements outlined in DoD Directive 8570.01-M for Information
Assurance Technician Level 3.


<!--[if !supportLists]-->·
<!--[endif]-->Current Top Secret
Clearance with SCI Eligibility

<!--[if !supportLists]-->·
<!--[endif]-->Eligibility for access
to Special Access Program Information

<!--[if !supportLists]-->·
<!--[endif]-->Willingness to submit
to a Counterintelligence polygraph


<!--[if !supportLists]-->·
<!--[endif]-->Must be familiar with
security policy/manuals and the appropriate DCIDs/JAFANs and other guiding
policy documents.

<!--[if !supportLists]-->•
have the ability to work in a dynamic environment and effectively interact with
numerous DOD, military/civilian personnel and industry partners

<!--[if !supportLists]-->•
knowledge of Microsoft Office (Word, PowerPoint, and Excel)

<!--[if !supportLists]-->•
a high degree of originality, creativity, initiative requiring minimal

<!--[if !supportLists]-->•
to travel within the organizational geographic Area of Responsibility (AOR)
(note - could be extensive, and will include both air and ground

<!--[if !supportLists]-->•
be able to lift 50 lbs


To apply for this job, contact:
Human Resources

Save This Job

Email This Job to a Friend