- Prepare detailed security assessment reports summarizing findings from the evaluations and recommend corrective actions.
- Support the Security Control Assessment (SCA) Team in testing and analyzing system-specific, common, and hybrid controls.
- Ensure compliance with all relevant security requirements and assist in maintaining necessary documentation for Assessment and Authorization (A&A).
- Collaborate closely with system stakeholders and other IT security professionals to ensure systems maintain their Authority to Operate (ATO).
- Participate in the development of security protocols and measures to enhance the overall information security framework.
- Provide inputs to improve security processes and support ongoing compliance efforts according to federal mandates.
- High School diploma with 10 years' experience in a related field (e.g., Cybersecurity, Information Technology, Information Security).
- Strong background in conducting security assessments and familiarity with FISMA, DHS directives, and NIST publications.
- Experience with security control assessments and risk management.
- Ability to communicate complex security concepts and risks effectively to both technical and non-technical stakeholders.
IT Security Specialist - Washington, United States - Silotech Group, Inc
Description
Overview Silotech Group is seeking a Level II Information Assurance (IT Security Specialist) to support the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA).
This key role is integral to ensuring that CISA's systems comply with Federal Information Security Management Act (FISMA), DHS Sensitive Systems Policy Directive 4300A, and applicable NIST guidelines.
Our mission is to provide our clients with technical excellence and robust security solutions that foster innovation, integrity, and outstanding service.
Location DC Clearance Requirements Candidate must possess an active TOP SECRET clearance Essential Role and Responsibilities * Conduct comprehensive security assessments to evaluate the weaknesses or deficiencies in CISA's information systems.