Designated Authorizing Official - Senior - TS/SCI w/Poly with Security Clearance Administrative & Office Jobs - Columbia, MD at Geebo

Designated Authorizing Official - Senior - TS/SCI w/Poly with Security Clearance

Your Impact:
Your Impact:
Jacobs is seeking a Designated Authorizing Official (DAO) Senior for a prime contract that is based out of our Columbia, MD officeAs a DAO Sr.
, you will serve on a team that is responsible for the Authorization and Assessment process under the Risk Management Framework (RMF) for new and existing information systems and will be expected to maintain Authority to Operate compliance for all assigned systemsThe work environment is fast-paced and sometimes involves deadline pressuresThe nature of the work requires a high degree of teamwork and cooperation with other members of the staff as well as individuals across the Company and CustomersOur program includes easily available process information and support from others with similar positions across the team
Responsibilities:
o Assist in identifying the overall security requirements for the protection of data and ensure the proper implementation of appropriate information security controls o Assist in performing and analyzing the security planning, assessment, risk analysis, risk management process, security control assessment, and awareness activities for systems, and networking operations o Assist the customer ensure that IA functions, particularly those focusing on infrastructure protection and defensive IT strategy, have been included in the development and risk management process o Interact with customers, IT staff, and high-level corporate officers to assist in defining and achieving required IA objectives for the organization o Contribute to building security architecture to customer standards and coordinates the integration of legacy system and existing IT environments for risk management o Contribute to the acquisition/RDT&E environment and building IA into systems deployed to operational environmentso Conduct Risk Assessments, determine the risk to operations, and provide risk recommendations to the customer after reviewing a system's overall risk posture as part of the Security Authorization (Authority to Operate) process o Create and review security authorization documentation and prepare plans of action and milestones based on the findings and recommendations of the security assessment report excluding any remediation actions taken for each system by working with various security stakeholders (ISSO/ISSE/ISSM/SCA) post authorizationo Provide continuous ad hoc authorization-related daily support to both customer and programsHere's What You'll Need:
o 12 years of related work experience in the field of security authorizationo A Bachelor's degree in Computer Science, Information Technology Engineering, or a related field may be substituted for 4 years' experienceo DoD 8570.
1 compliant IAM Level III certification, such as the GSLC, CISM, CISSP (or associate) certificationo US Citizen with an active TS/SCI w/Poly o A working knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, SP800-53, etco Knowledge and experience in security disciplines including, but not limited to, risk management, intrusion detection, contingency planning, incident handling, configuration control, change management, auditing, information systems security, operations security, administrative security, personnel security, physical security and communications securityo Expert professional knowledge and experience of information systems security policies and practices, computer science, state-of-the-art security tools and applications, and a thorough knowledge of ITo Experience implementing the Risk Management Framework with the ICD 503 and CNSSI 1253 Security Controlso Experience in conducting Risk Assessments and developing realistic and comprehensive recommendations and mitigation planso Working knowledge of system security design process, defense -in-depth/breadth, engineering life cycle, information domains, cross-domain solutions, controlled interfaces, and the principles of IAo Attendance is always criticalMust be able to work a 40-hour workweek, normally Monday through FridayHowever, times and days may vary depending on business requirementsNeeds to be available to work overtime during critical peaks and be available to meet last minute requests for overtime should the situation occuro Must be able to communicate effectively both verbally and in writingo Must put forward a professional behavior that enhances productivity and promotes teamwork and cooperationo Must be able to interface with individuals at all levels of the organization both verbally and in writingo Must be well-organized with the ability to coordinate and prioritize multiple tasks simultaneouslyo Must work well under pressure to meet deadline requirementso Must take and pass a drug test and background check as well as a motor vehicle records checkPreferred:
o Previous work experience as one of the following:
o Information Systems Security Engineer, o Information Systems Security Officer, o Information Systems Security Manager, or Delegated Authorizing Official o Experience briefing senior customer personnel o Should have experience working with the XACTA IA Managero Should be highly analytical and effectively able to troubleshoot and prioritize needs, requirements, and other issueso Should be committed to continuous learning and system development because of the constant developing nature of cyber-attackso Should have the ability to quickly learn new concepts, data formats, and softwareo Should be a self-motivated, independent, detail oriented, responsible team player, and exhibit exceptional relationship management skills#DivergentSolutions #June28event #July12event Recommended Skills Administration Architecture Attention To Detail Auditing Business Relationship Management Business Requirements Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.