Assessment and Authorization Specialist at J5 Consulting
Chantilly, Virginia, USA -
Full Time


Start Date

Immediate

Expiry Date

03 Nov, 25

Salary

0.0

Posted On

04 Aug, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Security Policy, Cloud, Integration, Engineers, Virtualization, Mitigation Strategies, Information Technology, Assessment, Security Controls, Csslp, Documentation, Regulations, Developers, Information Assurance, Vulnerability, Computing

Industry

Information Technology/IT

Description

J5 Consulting is a Maryland based company established in 2006 to provide computing and consulting services for government and commercial entities. Our services improve Information System networking performance and compliance and protect electronic assets from loss and compromise. We welcome your application to receive consideration for the following position.
This position is available immediately.

JOB OVERVIEW:

The Customer is seeking a hands-on security professional to provide Assessment and Authorization (A&A) support to multiple complex programs. The organization is growing in scope and complexity and requires significant support managing current and future programs

CONTRACTOR SHALL HAVE THE FOLLOWING REQUIRED SKILLS, CERTIFICATIONS AND DEMONSTRATED EXPERIENCE:

  • Demonstrated experience advising and assisting customers with the Lifecycle Assessment and Authorization (A&A) process.
  • Demonstrated experience advising and assisting customers with development of System Security Plans.
  • Demonstrated experience using COTS/GOTS and custom tools and process or procedures in order to scan, identify, contain, mitigate and remediate vulnerabilities, and intrusions.
  • Demonstrated experience monitoring, tracking, and updating status of systems in the assessment queue.
  • Demonstrated experience coordinating technical security assessments of computing environments and systems to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies.
  • Demonstrated experience assisting architects, developers, and engineers in the identification and implementation of appropriate information security controls and potential security functionality to ensure uniform application of security policy and enterprise solutions.
  • Demonstrated experience creating and reviewing A&A Body of Evidence (BOE) documentation, providing assessment on compliance of its content for A&A adjudication.
  • Demonstrated experience validating and verifying system security requirements definitions and analysis and establishing system security designs for controls.
  • Demonstrated experience assessing and mitigating system security threats or risks throughout the program life cycle.

SKILLS AND DEMONSTRATED EXPERIENCES THAT ARE HIGHLY DESIRED BUT NOT REQUIRED TO PERFORM THE WORK INCLUDE:

  • Demonstrated experience creating and reviewing A&A Body of Evidence (BOE) documentation, providing assessment on compliance of its content for Customer’s use for A&A adjudication.
  • Demonstrated experience supporting the design, development, implementation and integration of IA and security systems and system components including those for networking, computing, virtualization, cloud, and enclave environments to include those with multiple enclaves and with differing data protection or classification requirements.
  • Demonstrated experience in Cybersecurity, Information Assurance, Information Technology, or equivalent.
  • Demonstrated experience implementing security and risk mitigations in compliance defined in IC, FISMA, and NIST policies.
  • Demonstrated experience supporting multiple complex programs simultaneously, prioritizing work appropriately.
  • Demonstrated ability to deliver tailored briefings that convey complex concepts or technical information regarding information security issues clearly and concisely to audience of diversified rank, skills, and experience.
  • Demonstrated experience with the Customer A&A tracking tool and best practices for its use.
  • Demonstrated experience with Customer’s security scanning requirements and documentation best practices.
  • Certifications:
  • Certified Information System Security Professional (CISSP)
  • CSSLP (Certified Secure Software Lifecycle Professional)
  • CompTIA Security+
  • AP Certified (Authorization Professional)

Responsibilities

Please refer the Job description for details

Loading...