Security Control Assessor; SCA
Listed on 2026-01-17
-
IT/Tech
Cybersecurity, Information Security
Req : RQ212818
Type of Requisition: Regular
Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph
Public Trust/Other
Required:
None
Job Family: Cyber and IT Risk Management
Skills: Information Security,Information Systems,Risk Mitigation Strategies,System Security
Experience: 5 + years of related experience
US Citizenship
Required:
Yes
The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).
SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented θέμα‑Information (SCI) and Special Access Program (SAP) activities within the customer’s area of responsibility.
Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure.
Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)
Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues.
Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization.
Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required.
Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system.
Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary.
ுக்
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).