top of page

Security Control Assessor (SCA) DARPA

Arlington, VA 22203, USA

Job Type

Full Time

Workspace

Onsite

Requirements

Æsir International has a unique opportunity supporting one of our highly valued Government clients, Defense Advanced Research Projects Agency (DARPA). Æsir is seeking a highly motivated Professional with the skill set and experience to support one of the Nation’s premier Government Agencies in protecting advanced technologies and assets against National Security threats.

Program Information Technology (PIT) Security Control Assessor (SCA)

Work Location

(DARPA HQ) 675 North Randolph Street, Arlington, VA 22203

One block from Ballston Mall


On Site or Remote

On Site @ DARPA HQ in Arlington VA

Travel

Up to 25% - Mostly Domestic/CONUS

Workplace dress attire

Business Casual

Core Hours

7:00 am to 4:00 pm

Parking

Ballston Mall (pay to park), surrounding streets (pay to park)

Metro

Ballston-MU Metro Station (four blocks from DARPA work location)

Key Position

Requires 30 day notice for resignation

Clearance/Access required

Top Secret with SCI eligibility

 

Æsir International is a SBA certified Veteran Owned Small Business that focuses on Program Security Services, Cyber Security, as well as IT and Mission support services. Æsir International was founded on the principles of providing rapidly deployable personnel and solutions with mission centrical focus and streamlined capabilities for United States Department of Defense (DoD), Department of State (DoS), Intelligence Community (IC), as well as Commercial Industry.

Position Overview

The Cybersecurity Specialists/PIT SCAs are expected to work on complex systems across multiple levels of classification and therefore have expertise in the various DOD and IC policies and standards governing multi-level IT systems.

Candidates must have successfully completed a DoD-approved baseline certification as a CISSP in accordance with DoD 8570.1-M, along with relevant work experience as specified for an Information Assurance Technical (IAT) Level III or Information Assurance Management (IAM) Level II in DoD Manual 8570.1-M. Specific experience on DoD platforms, weapons systems, or sub-systems, in particular during the research & development cycle for those systems, is highly desirable.

Cybersecurity Specialists/PIT SCAs must possess the subject matter expertise, maturity, and disposition to operate autonomously with DARPA PMs and their technical teams within defense industry and Government/military partners across the DoD and IC. They must have experience participating in collateral, SCI and/or SAP assessment and  authorization events for developmental or operational enterprise-level information systems, cyber/information operation ranges, and/or PIT systems.

Cybersecurity Specialists/PIT SCAs must be capable of assessing and authorizing PIT systems at all classification levels supporting multiple technology areas including, but not limited to: space systems, manned and unmanned aircraft systems, manned and unmanned surface and sub-surface vessels, cyber weapons development and operational platforms, weapons data links, RF communications systems, directed energy systems, and portable electronic devices for battlefield use.

§  Must possess experience in successfully meeting and participating in Defense Information System Agency (DISA), National Security Agency, and USCBYERCOM Computer Network Defense Program (CNDSP) and CBYERCOM Computer Readiness Inspections (CCRI)

§  Experience with network security devices, classified Local Area Networks, Wide Area Networks, public key infrastructure (PKI), virtual machines, and end-point security solutions.

§  Must be thoroughly familiar with, understand, and be able to apply the standards and requirements contained in the following:

1.     DoD Instruction 5220.22 National Industrial Security Program (NISPOM) Operating Manual, Chapter 8

2.     Defense Security Service Manual for the Certification and Accreditation of Classified Systems under the NISPOM Version 3.2

3.     DoD Directive 5205.16 The DoD Insider Threat Program

4.     NIST SP 800-53 Rev. 4, Security and Privacy Controls for Federal Information Systems and Organizations

5.     DoD Joint Special Access Program Implementation Guide (JSIG)

6.     Committee for National Security System Policy (CNSSP) Policy (CNSSP) No. 22 on Information Assurance Risk Management for National Security Systems

7.     CNSSP No. 26 National Policy on Reducing the Risk of Removable Media

8.     Committed for National Security Systems Directive (CNSSD) No. 504 Directive on Protecting National Security Systems From Insider Threat

9.     Committee for National Security System Instruction (CNSSI) No. 1253 Security categorization and Control Selection for National Security Systems

10. DoDD 8000.1, Management of DoD Information Resources and Information Technology

11. DoD Directive 8100.2, Use of Commercial Wireless Devices, Services, and Technologies in the DoD Global Information Grid (GIG)

12. DoDD 8140.01 Cyberspace Workforce Management

13. DoDI 8500.01 Cybersecurity

14. DoD Instruction 8510.01 Risk Management Framework (RMF) for DoD Information Technology

15. DoD Directive 8530.1, Computer Network Defense (CND)

16. DoD Instruction 8530.2, Support to CND

17. DoD Instruction 8551.1, Ports, Protocols, and Services Management (PPSM)

18. DoD Manual 8570.01-M Information Assurance Workforce Improvement Program

19. DCID 6/3, Protecting SCI within Information Systems

20. Intelligence Community Directive (ICD) 503

21. Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510.01B Cyber Incident Handling Program

22. Defense Federal Acquisition Regulation Supplement (DFARS)

23. Clause 253.204-7012: Safeguarding Unclassified Controlled Technical Information

24. DoDI 8581.01 Information Assurance Policy for Space Systems Used by the Department of Defense

 

Note: The legacy cybersecurity/information security accreditation governance documents are listed due to the state of transition of network accreditation guidance and the fact that networks may be operating under legacy certification and accreditation guidance.

§  Ensure system security requirements are addressed during all phases of DARPA program life cycles (concept development, Request for Information (RFI), Request for Proposal (RFP) or BAA, Proposal, Selection, Award, Closeout, Transition, etc.).

§  Planning, preparing, and executing inspections, authorization and approval (A&A) events IAW with the respective policies detailed in paragraph 3.12.c. for all classifications of networks; to include the development and review of Automated Information System Authorization and Approval Packages.

§  Develop, review, endorse, and recommend action by the authorizing official (AO), delegated authorizing official (DAO), or designated approval authority (DAA) for system certification documentation

o   Conduct quality control of system accreditation packages for completeness of accreditation artifacts within 3 business days of receipt from the technology office security staffs or their cleared defense industry contractors and/or participating government agencies.

o   Process authorization and approval or denial documentation to the respective DAPRA AO/DAO/or DAA within 10 business days of receipt of a complete package

§  Conduct security control assessments for the evaluation of security controls to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for an AIS

§  Provide an assessment of the severity of weaknesses or deficiencies discovered in the information system and its environment of operation and recommend corrective actions to address identified vulnerabilities

§  Analyze and make recommendations in support of DARPA accredited network Configuration Control Board cases within 10 calendar days of case validation by the respective network’s Information System owner

§  Monitor activities of DARPA accredited networks and DARPA DAO Accredited performer networks

§  Provide advice, assistance, and analysis of threats and vulnerabilities and risk mitigation and acceptance recommendations, as required. Conduct certification tests that include verification that the features and assurances are functional and support accreditation

§  Work collaboratively with the MSO/Information Technology Directorate (ITD) in the authorization and approval and continuous monitoring of DARPA unclassified and classified networks; including but not limited to:

1.     DARPA Management Security System (DMSS) – Unclassified

2.     DARPA Public Network (DPN) - Unclassified

3.     DARPA Secret Network (DSN)/Secret Internet Protocol Router Network (SIPRNet) Connection – up to SECRET Collateral

4.     DARPA Joint Worldwide Intelligence Communications System (JWICS) Network (DJN)/JWICS Connections – up to TOP SECRET SCI

5.     DARPA Secure Wide Area Network (DSWAN) – up to SECRET Collateral

6.     Multi-Level Security System (SAVANNAH) – up to TOP SECRET SAP and SCI

§  Review and recommend changes or amplification of policy, procedures, and strategy development

§  Evaluate Information Assurance (IA) products and provide written recommendations as to their risk and usefulness and/or adoption for the DARPA IA mission

§  Evaluate information technology (IT) vulnerabilities to assess whether additional safeguards are prudent and ensure certification is accomplished for each information system

§  Develop and maintain a formal, written Information Systems Security Program SOP

§  Ensure all Information System Security Officers (ISSO), network administrators, and other Automated Information Security (AIS) personnel, to include DARPA performers performing these functions, receive the necessary and required technical and security training to carry out their duties

§  Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local AIS security training.

§  Maintain a repository for all system certification/accreditation documentation and modifications

§  Coordinate AIS security inspections, tests, and reviews

§  Prepare policies and procedures for responding to security incidents and for investigating and reporting security violations and incidents

§  Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered

§  Assess changes in a system, its environment, or operational needs that could affect the accreditation

§  Ensure configuration management (CM) for security-relevant AIS software, hardware, and firmware is maintained and documented

§  Perform system audits on multiple systems; work closely with system administrators and ensure current security measures are sufficient and in compliance with approved policies and processes

§  Perform, and conduct training as required, for the execution of secure file transfers/trusted downloads between local systems to storage devices, this includes secure down writing of data between systems of different security levels

§  Provide technical advice and assistance, as required, and perform technical oversight on telecommunications requirements for Collateral, SAP, and SCI systems and networks

§  In coordination with SID Emergency Management, review and provide AIS security relevant input to DARPA Emergency/Disaster plans and procedures

Required Skills (Knowledge, Skills, Abilities)

§  Relevant work experience as specified for an Information Assurance Technical (IAT) Level III or Information Assurance Management (IAM) Level II in DoD Manual 8570.1-M

§  Extensive knowledge of RMF (Risk Management Framework)

§  Experience assessing and authorizing various PIT systems (of all classification levels) including but not limited to; space systems, manned and unmanned aircraft systems, manned and unmanned underwater vessels, cyber operation platforms, cyber capabilities, directed energy systems, and hand-held battle field orientation electronic devices

§  The candidate must also possess the interpersonal communications skills required to foster confidence in their knowledge and, thus, confidence in the advice and recommendations they provide to PSOs, PMs, SETAs, Technical Office leadership, and industry/government partners.

Professional Business Functions

§  Attend meetings (either locally or out-of-area) and create meeting summaries or trip reports

§  Prepare and submit meeting minutes on an as-required basis

§  Prepare/present briefings, incorporating graphics (if appropriate) for/to SID/ DARPA leaders

§  Prepare various security forms associated with their duties

§  Assist in entry control and perform escort duties for visitors

§  Answer telephones and other modes of administrative communications in the performance of duties

§  Perform self-inspections, identify security discrepancies, and report security incidents

§  Perform, or support, security inspections, identify security discrepancies and prepare reports

§  Perform courier duties within the continental United States (CONUS)

§  Perform user-level security administrator and information security responsibilities are required and in compliance with US Codes, Executive Orders, and DoD and DARPA policy

§  Perform objective reviews on all documentation encountered during performance of duties

 

 

 

Clearance

§  Minimum of active Top Secret (TS)

§  TS/SCI strongly desired

§  Subject to a random counter-intelligence scope polygraphs as a condition of access eligibility.

 

Years of Experience/Education Requirements

§  The positions require a Bachelor’s degree in Computer Science or Information Systems with at least 12 years of specific, demonstrable, and successful experience fulfilling a Cybersecurity role for a DoD or IC customer on similar size and scale.

§  A Master’s degree in Computer Science or Information Systems may substitute for 4 years of relevant experience.

Certification Requirements

§  DoD Approved Baseline Certification as a CISSP IAW DoD 8570.1-M

Travel Requirements

§  Some travel is required for this position.

§  Ability to travel to CONUS and/or OCONUS locations

§  Must have active US passport for OCONUS travel requirements

Additional Information 

§  This job description is not designed to cover or contain all job duties required of the employee. There may be additional activities, duties and/or responsibilities that are required for this position that are not listed in this job description. 

§  In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.  


To apply email resumes to careers@aesirinternational.com 

About the Company

Æsir International is a SBA certified Veteran Owned Small Business that focuses on Program Security Services, Cyber Security, as well as IT and Mission support services. Æsir International was founded on the principles of providing rapidly deployable personnel and solutions with mission centrical focus and streamlined capabilities for United States Department of Defense (DoD), Department of State (DoS), Intelligence Community (IC), as well as Commercial Industry., Æsir International is closely located to our Northern Virginia and Washington, D.C. metro area customer base with headquarters in Harpers Ferry, West Virginia and Bluemont, Virginia.

Contact Us

Success! Message received.

Harpers Ferry, WV 25425

Tel. 800-553-9086

bottom of page