Security Controls Assessor at Hunter Strategy
Remote, Oregon, USA -
Full Time


Start Date

Immediate

Expiry Date

15 Oct, 25

Salary

0.0

Posted On

16 Jul, 25

Experience

4 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Active Dod Secret Clearance, Information Technology

Industry

Information Technology/IT

Description

REQUIREMENTS:

  • Bachelors degree in Information Technology or related field.
  • One or more DoD 8570/01-M Cyber Certifications (such as CompTia Security+)
  • 8+ years of experience in Information Technology with a focus on CyberSecurity
  • 4+ years of experience performing as a Security Controls Assessor.
  • Active DoD Secret Clearance and/or clearable for a Government Security Clearance.

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities
  • Apply comprehensive knowledge of concepts, processes, practices, and procedures on technical assignments.
  • Support enterprise Cybersecurity standards in coordination with Government develops and implements Cybersecurity standards and procedures.
  • Coordinate development, and recommends security processes for an organization.
  • Recommend Cybersecurity solutions to support customers’ requirements. Identifies and reports security violations.
  • Recommend and satisfies Cybersecurity requirements based upon the analysis of CSPP, policy, regulatory, and resource demands.
  • Support customers at the highest levels in the development and implementation of processes and policies.
  • Apply know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures.
  • Support analysis, design, and development of security features for system architectures.
  • Analyze security requirements for computer systems which may include mainframes, workstations, and personal computers.
  • Design, develop, engineer, and implement solutions that meet CSPP requirements.
  • Provide integration and implementation of the computer system security solution.
  • Analyze general Cybersecurity-related technical problems and provides basic engineering and technical support in solving these problems.
  • Support vulnerability/risk analyses and makes recommendations on computer systems and applications during all phases of the system development life cycle.
  • Perform all procedures necessary to ensure the safety of information systems data assets and to protect systems from intentional or inadvertent access or destruction.
  • Ensure that all information systems are functional and secure.
Loading...