FISMA Analyst - CyberData Technologies
Remote, VA 20170
About the Job
Title: FISMA Analyst
Location: Remote
Responsibilities:
- Lead and conduct multi-level (application, database, operating system, middleware, monitoring tools, and business processes) security control assessments of systems based on predefined test objectives and test plans.
- Coordinate, and track interviews with system owners, ISSOs, and administrators on operational, management, and technical processes.
- Draft Security Control Assessment Plans (SCAP) to include the scope and methodology for testing.
- Develop test procedures and/or document recommendations for test plan modifications that improve validation of control objectives.
- Assist the assessment team obtaining, reviewing, and interpreting evidence provided to validate security controls are implemented properly and performing effectively.
- Review the security controls in the information system and its environment of operation to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements.
- Work with the Risk Management (RM) team to determine risks to the system based on vulnerability results and compensating or mitigating controls in place.
- Produce the Security Assessment Report (SAR) that documents the results of the assessment.
- Provide insight on NIST 800-53 technical controls during assessments.
- Review asset, application, and code scan results from various tools for assessed systems
- Review compliance scans against defined baselines for assessed systems.
- Provide recommendations to system owners and information system security officers (ISSOs) for remediating identified vulnerabilities.
- Write supporting documentation for security control assessment and other risk management processes and procedures.
- Provide process improvement recommendations for day-to-day operations.
- Provide technical guidance to the RM team and other stakeholders as needed.
Skills & Experience:
- Minimum of five to seven years of experience in both security control assessments, and security assessment and authorization (SA&A) activities.
- Strong Knowledge of Risk Management Framework requirements.
- Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws, etc.), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.
- Understanding of new and emerging IT and information security technologies.
- Strong knowledge of FISMA regulation, FIPS standards, NIST 800 series, NIST Special Publications and other applicable guidance.
- In depth knowledge of processes used to assess risk and establish security requirements and documentation to ensure that information systems possess security safeguards commensurate with the level of exposure to potential risk, as well as damage to assets or individuals.
- Expert understanding of measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. In-depth knowledge, skills, and abilities needed to enforce Information Assurance and Cybersecurity requirements, apply Information System Security (INFOSEC) methodologies and facilitate SA&A as well as continuous monitoring activities, such as vulnerability scans and security control assessments. Able to analyze and assess vulnerability scan outputs and provide feedback to CISO and system owner.
- In-depth knowledge of information assurance levels and risk impact thresholds in meeting applicable security policies, standards and requirements to ensure that accrediting authorities have the information necessary to make an objective authorization determination based on an acceptable level of risk. Employee should be able to analyze, evaluate, and assess information system security policies, processes and procedures necessary to ensure a comprehensive multi-disciplined assessment of technical and non-technical security features and associated safeguards.
- In-depth knowledge of System Security Plan, Contingency Plan and Testing, POA&Ms, Risk Assessment, and other security related documents. Employee should be able to assist ISSOs and/or system owners on addressing security controls and implementation methods in the SSP as well assist in contingency planning and testing, security control assessment and vulnerability scanning. Able to analyze, assess, control, determine, mitigate and manage risk within a federal management framework or within federal interest computer systems that store, process, display or transmit Personally Identifiable Information (PII). Able to identify, implement and integrate management and administrative risk methodologies for securing critical and sensitive information infrastructures and establishing standards necessary to help protect the confidentiality, maintain the integrity and ensure the availability of critical organizational computing resources.
- Strong communication and interpersonal skills with the ability to act as a resource for, provide customer service in a courteous manner to, and work effectively with diverse groups of people at various levels within an organization. Writing skills sufficient to compose and edit a variety of documents using correct spelling, grammar, and punctuation, with the ability to pay close attention to detail and proofread work carefully.
- Strong organizational skills sufficient to prioritize work and complete assignments accurately, either independently or as part of a team, under pressure of competing deadlines and with frequent interruptions, working from own initiative and/or following directions, policies, or procedures. Independently establish priorities and coordinate and complete assignments within established timeframes.
- Ability to identify customer needs and use analytical and decision-making skills to offer options and resolve problems in a variety of contexts.
- Ability to effectively communicate technical issues, identify technical gaps, and the root cause of systemic issues.
- Experience performing security control assessments against a wide variety of systems including cloud-hosted applications (i.e., SaaS, PaaS, IaaS), web applications and general support systems.
- Experience writing SARs for documenting security assessment results.
- Experience reviewing scan results from various tools and incorporating results in in the security assessment process.
- Experience providing recommendations to system owners and ISSOs for remediating vulnerabilities.
- Experience with vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures.
- Operating system concepts - experience with both Windows and Linux environments.
- Strong technical, analytical, and interpersonal skills.
- Ability to work in a team-oriented environment.
- Must be self-driven and be able work independently.
- Bachelor's degree in IT or related field.
- CAP, CEH, and/or CISSP certification is preferred.
Source : CyberData Technologies