Challenging Today.
Reinventing Tomorrow.
We're invested in you and your success.
Everything we do is more than just a project.
It's our challenge as human beings, too.
That's why we bring a thoughtful and collaborative approach to every one of our partnerships.
At Jacobs, we challenge the status quo and redefine how to solve the world's greatest challenges, transforming big ideas into intelligent solutions for a more connected, sustainable world.
Design your career with a company that inspires and empowers you to deliver your best work so you can evolve, grow and succeed – today and into tomorrow
Your Impact:
Jacobs is currently interviewing Senior Delegated Authority Officer (DAO) candidates with a TS/SCI w/Poly clearance supporting our government customer in Fort Meade, Maryland.
RESPONSIBILITIES:
The Delegated Authorizing Official (DAO) will:
Assist in identifying the overall security requirements for the protection of data and ensure the proper implementation of appropriate information security controls
Assist in performing and analyzing the security planning, assessment, risk analysis, risk management process, security control assessment, and awareness activities for systems, and networking operations
Assist the customer ensure that IA functions, particularly those focusing on infrastructure protection and defensive IT strategy, have been included in the development and risk management process
Interact with customers, IT staff, and high-level corporate officers to assist in defining and achieving required IA objectives for the organization
Contribute to building security architecture to customer standards and coordinate the integration of legacy system and existing IT environments for risk management
Contribute to the acquisition/RDT&E environment and building IA into systems deployed to operational environments
Conduct Risk Assessments, determine the risk to operations, and provide risk recommendations to the customer after reviewing a system’s overall risk posture as part of the Security Authorization (Authority to Operate) process
Create and review security authorization documentation and prepare plans of action and milestones based on the findings and recommendations of the security assessment report excluding any remediation actions taken for each system by working with various security stakeholders (ISSO/ISSE/ISSM/SCA) post authorization
Provide continuous ad hoc authorization-related daily support to both customer and programs.
#c
#divergent
Here’s What You’ll Need:
QUALIFICATIONS:
At least 12 years of progressive experience in Information Assurance or a BS in Computer Science (or a related field) with at least 8 years of progressive experience
Possess a DoD 8570 IAM III Certification minimum (CISM, CISSP, GSLC
Possess an Active TS/SCI security clearance w/Polygraph
Knowledge and experience in security disciplines including, but not limited to, information systems security, operations security, administrative security, personnel security, physical security and communications security.
Expert professional knowledge and experience of information systems security policies and practices, computer science, state-of-the-art security tools and applications, and a thorough knowledge of IT.
Experience implementing the Risk Management Framework with the ICD 503 and CNSSI 1253 Security Controls
Experience in conducting Risk Assessments and developing realistic and comprehensive recommendations and mitigation plans
Previous work experience as one of the following:
Information Systems Security Engineer,
Information Systems Security Manager
Delegated Authorizing Official
Desired Requirements:
Should be a motivated self-starter requiring limited direction and supervision
Ability to organize and prioritize numerous customer requests in a fast pace deadline driven environment
Experience briefing senior customer personnel
Knowledge of and hands on experience with Xacta
Experience with Security Testing, Intrusion Detection, and Incident Handling
Familiarity with Cloud Security
Familiarity with System Integration and the Engineering Life Cycle, the System Security Design Process, the concepts of Defense-In-Depth/Breadth
Familiarity with Identification, Authentication and Authorization
Experience with Contingency Planning, Configuration Control and Change Management
Familiarity with System Integration and the Engineering Life Cycle, the System Security Design Process, the concepts of Defense-In-Depth/Breadth
Familiarity with Identification, Authentication and Authorization
Experience with Contingency Planning, Configuration Control and Change Management
Familiarity with Cross Domain Systems and Controlled Interfaces