Cyber Security SME

Location: McLean, VA
Date Posted: 03-29-2018 #10764709

Deadline for resume Submission:5/19/18 12:00 AM

The Client requires a Cyber security expert with at least 11 years of experience to provide systems security support, provide customer advocate support, and provide action item/tasking review support. The candidate will be responsible for providing the ISSO security functions in support of Assessment and Authorizing (A and A) of systems owned by the Client's IT staff and other selected customer components, using principles of the Client's partners security and NIST SP 800-37 Risk Management Framework (RMF). The candidate will be using the Telos XACTA Certification and Authorization workflow and repository tool. The Cyber Security expert support ensures that the security requirements and procedures are in place for the systems under the purview of the component. These services, including the ISSO role 1. Participates in efforts associated with network and system development, implementation, operations, maintenance and procurement. 2. Determines the appropriate levels of security commensurate with the network, systems and applications. 3. Develops and maintains System Security Plans (SSP) for assigned networks and systems and conduct periodic compliance reviews of SSPs. 4. Leads efforts associated with the development and maintenance of network, system and application security plans and contingency plans. 5. Leads efforts in risk management planning and assessments to re-evaluate sensitivity of networks/systems, risks, and mitigation strategies. 6. Notifies appropriate staffs and officials of any suspected network and system incidents and assists in the investigations of incidents. 7. Establishes procedures to ensure that only authorized personnel have access to the networks and systems. Enforces security policies and safeguards and ensures users of the networks and systems have required clearances, need-to-know, appropriate indoctrinations, etc. Ensures user account termination procedures are in place. 8. Initiates network and system protective and corrective measures when a security incident or vulnerability is discovered. 9. Plans and manages network and system security improvements; sets clear objectives for security management/adherence to policy for IT Operations Service Providers. 10. Provides input to network and system security incident reports, equipment/software inventories, operating instructions, technical vulnerability reports and contingency plans. 11. Ensures system recovery processes are monitored to ensure that security features and procedures are properly restored. 12. Provides assistance and support associated with network and system declassification. 13. Ensures all personnel accessing the networks and systems complete the appropriate security training. 14. Participates in network and system configuration management processes to include participation on appropriate customer boards. 15. Establishes network and system identification and authentication procedures and processes. 16. Conducts network and system security audits and reviews audit reports, coordinates with system owner, data owners, service providers and others, and maintains all system security documentation. 17. Leads a weekly peer review of systems. The Customer Advocate (CA) support ensures business customers have a single POC for their business IT needs. Additionally, the CA 1. Serves as system analyst to capture business requirements presents them to the customer's project review boards. 2. Provides technical assistance in identifying candidate solutions to meet customer requirements. 3. Provides acquisition planning and monitoring support to ensure business requirements are properly implemented. The Action item/report support ensures the component address all required action items. This includes 1. Reviewing Client wide draft policies to ensure acceptance by the component. 2. Reviewing Executive Branch directives for potential changes to internal business process/procedures.
MANDATORY Certifications: 1. Security related certification (CAP, Security+ or CISSP)

OPTIONAL SKILLS: 1. Demonstrated on-the-job experience with exploits, attacks and tools used by skilled hackers
2. Demonstrated on-the-job experience in two or more of the following Information Security disciplines Network Security, Computer Forensics, Physical Security, Client Computer Systems, Firewall/Router Management, Security Project Management or Network Vulnerability Analysis
3. Demonstrated on-the-job experience implementing the requirement of the Federal Information Security Management Act of 2002 (FISMA)

About Avid Technology Professionals 
Avid Technology Professionals, LLC (ATP) is a premiere provider of software and systems engineering, and acquisition program management services for the community. ATP is actively seeking to pursue contract opportunities with other departments and agencies in the federal government, in state governments, and in the commercial sectors. Delivered by seasoned experts in the IT field, ATP solutions adeptly address the IT concerns manifesting in both the federal and commercial sectors.
Employee Benefits
The ATP Employee Benefits package includes:
  • A Supportive and Equitable Working Environment that is both Stimulating and Challenging
  • Competitive Hourly Salary
  • Unique Employee Success Sharing Program that allows ATP employees to Share in Company's Successes
  • Automatic Approved Overtime (as long as contract permits)
  • Retirement Pay (401K); 100% company paid, immediately vested with Profit-Sharing Component
  • Company Medical Coverage Plans - HMO, Open Access, PPO plans
  • Company Dental Plan - widely accepted, comprehensive, and flexible
  • Progressive Overtime Policy
  • Flexible Spending Account benefit
  • Lucrative Referral Bonus Policy
  • Holiday Scheduling that Coincides with Government Holidays
  • Robust Professional Expenses & Training Program
  • Computer Allowance
  • Internet Allowance
  • Short and Long Term Disability
  • Life Insurance
this job portal is powered by CATS