Come make your mark with Watermark!
đď¸ FOUNDED BY USAF VETERANS in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business.
đ SUBJECT MATTER EXPERTS specializing in security and risk management. Weâre intimately familiar with DOD security programs and mission requirements.
â OUR CORE VALUES drive every action we take as a company. We strive to exhibit PERSPECTIVE, PASSION, COMMUNICATION, INTEGRITY AND ETHICS, and BALANCE in all we do.
đ˛COMPETITIVE BENEFITS PACKAGE to address our employeesâ physical, mental, emotional, and financial well-being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first!
Security Control Assessor III
The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customerâs area of responsibility.
In this role you willâŚ
- Perform oversight of the development, implementation and evaluation of IS security program policy;special emphasis placed upon integration of existing SAP network infrastructure
- Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)
- Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues
- Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization
- Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required
- Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system
- Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary
- Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR
- Evaluate security assessment documentation and provide written recommendations for security authorization to the Government
- Discuss recommendation for authorization and submit the security authorization package to the AO/DAO
- Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.
- Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy
- Assist the Government compliance inspections
- Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken
- Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)
- Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries
- Evaluate the effectiveness and implementation of Continuous Monitoring Plans
- Evaluate the differences and have a working knowledge of Information Systems and Network Appliances operating at Protection Level 3 (PL3) and Protection Level 4 (PL4)
- Differentiate the differences between the various types of Cross-Domain Solutions (CDS)
- Assist with joint assessments of Cross-Domain Solutions with other DoD agencies
- Additional duties as assigned
Experience Requirements:
- 9-12 years related experience
- Minimum of nine (9) yearsâ experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
- Prior performance in the role of ISSO and ISSM or SCA
Education Requirements:
- Bachelorâs degree in a related area or equivalent experience (4 years)
Certification Requirements:
- Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level III or Information Assurance Architect and Engineer Level I within 6 months of the date of hire
Security Clearance Requirements:
- Current Top Secret/SCI (TS/SCI) clearance
- Eligibility for access to Special Access Program Information
- Willingness to submit to a Counterintelligence polygraph
Other Requirements:
- Reports to a physical location which occasionally requires the ability to traverse between buildings
- Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
- Mastery of Microsoft Office (Word, PowerPoint, and Excel)
- Must be able to regularly lift 50 lbs
- May require sedentary work at least 50% of the time
- Ability to manage stress with a high degree of maturity/professionalism
- Demonstrated critical thinking and leadership skills and the ability to work well with others
- Effective verbal and written communication skills
- All Level I & Level II positions - candidate should possess some Special Access Program (SAP) experience
- All Level III positions -candidate should possess 2+ years of Special Access Program (SAP) experience
KEYWORDS: RMF, Risk Management Framework, ICD, Information Assurance, IA, IAO, IAT, IAM, A&A, A+, Network+, Security+, Non-classified Internet Protocol Router Network (NIPRNet), Secret Internet Protocol Router Network (SIPRNet), DISA Security Technical Implementation Guides (STIGs), CISSP, CASP
Watermark provides salary ranges with job postings in states where it is legally required; any other salary ranges associated with our postings are third party estimates and may not be an accurate reflection of Watermarkâs total compensation package. Multiple considerations are taken into account when determining the final salary/hourly rate, including but not limited to, Contract Wage Determination, education and certifications, relevant work experience, related skills and competencies, as well as Federal Government Contract Labor Categories. Central to Watermarkâs employment philosophy is the wellbeing of our employees which is why we offer a robust benefits package and wellness program alongside of annual base compensation.
Watermark Risk Management International, LLC is an equal opportunity and affirmative action employer and does not discriminate on the basis of race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, retaliation, parental status, military service, or other non-merit factors.
Watermark Risk Management International, LLC is a federal contractor and is therefore subject to any federal vaccine mandates or other customer vaccination requirements.