Security Analyst - Consultant
Listed on 2026-01-12
-
IT/Tech
Cybersecurity, IT Consultant, Information Security, Systems Engineer
SCOPE OF THE PROJECT:
The CLIENT Office of Cybersecurity (OCS) is responsible for the Security and Compliance of CLIENT Information Systems and Data. OCS seeks an expert Senior ISSO to oversee (and actively participate in) the day‑to‑day security and compliance requirements of complex information system operating environments. A successful Senior ISSO will lead the establishment, implementation and/or enhancement of Information Systems Security and Compliance efforts based on State/Agency Policy/Standards and Regulatory Guidance such as FISMA, NIST, CMS MARS‑E, HIPAA, etc.
DAILYDUTIES / RESPONSIBILITIES:
The Senior ISSO will report to the ISSO Team Lead in OCS and operate as an experienced cybersecurity consultant to CLIENT leadership, business units, business partners and vendors.
Security ProgramExperience:
Leadership experience with CMS MARS‑E, ARC‑AMPE, or other FISMA Risk Management Framework (RMF) compliant programs is strongly desired and will be given the highest weight. Experience should include well documented success in the development and maintenance of System Security Plans (SSPs), Privacy Impact Assessments (PIAs), Interconnection Security Agreements (ISAs), Computer Matching Agreements (CMAs), and related interviews and audit/assessment activities to complete and verify these and other RMF/Assessment and Authorization (A&A) tasks and artifacts.
Experience with development and integration of RMF/A&A tasks and artifacts in RMF type roles such as ISSO, Information Security Architect, Security Control Assessor, etc., into the System Development Life Cycle (SDLC) is ideal.
Experience in security as related to Cloud services and vendor management is considered desirable for this position.
Technical Knowledge:Hands on experience with any or all the following technologies would be considered a desirable for this position:
SQL Database
Duties and Responsibilities:
- Network Design and Information Flow
- System and Data Access Models
- Review Firewall Rule Requests (Ports, Protocols, and Services)
- Baseline Configuration Management Deviation Requests
- Vulnerability Management
CERTIFICATIONS:
CERTIFICATIONS:
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).