×
Register Here to Apply for Jobs or Post Jobs. X

Security Control Assessments Analyst - Mid

Job in Suitland, Prince George's County, Maryland, 20746, USA
Listing for: Jobs via Dice
Full Time position
Listed on 2026-03-12
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant
Salary/Wage Range or Industry Benchmark: 70000 - 90000 USD Yearly USD 70000.00 90000.00 YEAR
Job Description & How to Apply Below

Job Description

ECS is seeking a Security Control Assessments Analyst - Mid to work in our Suitland, MD office. The role is full‑time/permanent and supports a U.S. Government civilian agency. The position is available immediately for a qualified candidate with the appropriate background clearance.

Job Requirements
  • Strong written and verbal communication skills.
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • Knowledge of cyber threats and vulnerabilities.
  • Knowledge of specific operational impacts of cybersecurity lapses.
  • Knowledge of authentication, authorization, and access control methods.
  • Knowledge of application vulnerabilities.
  • Knowledge of communication methods, principles, and concepts that support the network infrastructure.
  • Knowledge of capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware.
  • Knowledge of cyber defense and vulnerability assessment tools and their capabilities.
  • Knowledge of Risk Management Framework (RMF) requirements.
  • Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
  • Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities.
  • Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross‑site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return‑oriented attacks, malicious code).
Job Responsibilities
  • Manage and create authorization packages (e.g., ISO/IEC 15026-2).
  • Plan and conduct security authorization assessments for initial authorization of systems and networks as well as systems in continuous monitoring.
  • Review authorization and assessment documents to confirm that the level of risk is within acceptable limits for each software application, system, and network.
  • Perform security assessments and identify security gaps in security architecture, providing recommendations for inclusion in the risk mitigation strategy.
  • Provide input to the Risk Management Framework process activities and related documentation (e.g., system life‑cycle support plans, concept of operations, operational procedures, and maintenance training materials).
  • Ensure that plans of action and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
  • Assure successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization’s mission and goals.
  • Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).
  • Ensure that all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.

Salary Range: $70,000 - $90,000

Required Skills
  • 4-year bachelor's degree or equivalent experience.
  • 4+ years’ experience developing information security and privacy policy.
  • Certifications that address security and risk management, asset security, security engineering, communications and network security, identity and access management, security assessment and testing, security operations, software development security, incident management, integration of computing/communications/business disciplines and enterprise components.
  • Active Public Trust clearance or eligible to obtain a Public Trust clearance.
Desired Skills
  • Experience reviewing and drafting Privacy Impact Assessments (PIAs).
  • Experience in assessing security controls based on cybersecurity principles and tenets (e.g., CIS CSC, NIST SP 800-53, Cybersecurity Framework,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary