What are the responsibilities and job description for the Computer Scientist position at Assertive Professionals?
Assertive Professionals is seeking a Computer Scientist supporting our National Security Customer at Quantico, VA.
This a a proposed position that should be awarded by 1 February. We will be offering a $5,000 sign-on bonus or reimbursable relocation, $1,200 compliance bonus, and competitive salary.
This is a great opportunity to work for an employee-centric, fast-growing small business. We offer an excellent benefits package, including PTO, 401k Match at 5%, Profit Sharing, Company paid Life Insurance, Dental, Vision, STD/LTD, and two options under a national medical plan with employer contribution.
Responsibilities Include:
The Computer Scientist provides expert technical support in data science, analytics, and metrics to advance the Industrial Security (IS) mission. This role involves developing and implementing innovative solutions using data science principles, analytics tools, and advanced computational techniques to support organizational goals. The Computer Scientist collaborates with IS senior leadership and stakeholders to ensure the effective application of artificial intelligence (AI), machine learning (ML), and other cutting-edge technologies in alignment with DoD strategies.
Required Experience and Qualifications:
- Active TS/SCI
- Masters Degree
- 5 years of specialized experience
- Ability to summarize complex information for executive-level consumption and break down details for requirements owners' understanding and use.
- Proficient in developing, maintaining, and facilitating the utilization of artifacts that document government requirements and understanding.
- Able to partner with senior leadership and staff to refine the Balanced Score Card for IS, assisting in establishing tracking mechanisms with leading and lagging indicators to demonstrate progress against IS strategic goals.
- Able to collaborate with stakeholders to identify requirements, develop course plans, and enhance processes.
- Able to review IS metrics in coordination with IS Government metrics group to develop standard operating procedures (SOPs) for accessing data from IS systems (e.g., NISS, NCCS), defining measurement standards, and generating ad-hoc and recurring reports and visualizations for IS operators, leaders, and external stakeholders.
- Able to consolidate IS metrics responses and creating visual representations for submission to the front-office Enterprise Performance Measures.
Able to collect information within IS and from emerging mission areas, providing recurring and ad-hoc metrics reporting support for IS, and additional stakeholders. - Able to conduct trend analysis to identify challenges, shortfalls, or emerging risks, and collaborating with IS stakeholders to determine root causes of significant changes.
- Able to plan and schedule work to promote a smooth flow and even distribution of activities, ensuring effective use of resources and alignment with organizational goals.
- Able to provide suggestions and recommendations for automation and analytic tools to increase efficiency and analysis capabilities for leadership.
- Able to provide integrated analysis of alternatives and course of action (both programmatic and technical).
- Able to support the Government lead by guiding the development and implementation of engagement plans with project and program managers, clarifying engagement levels at various project phases, and fostering stakeholder trust throughout the project lifecycle.
- Able to provide continued accreditation support based on the Risk Management Framework (RMF), applying risk management throughout the system lifecycle to identify, implement, assess, and monitor all applicable security controls, coordinating with CISO/Cyber on authorization requirements, change requests, and data transfers involving systems.
- Able to author and develop RMF artifacts, including the Security Plan (SP), Security Assessment Report (SAR), Security Controls Traceability Matrix (SCTM), and Plan of Action & Milestones (POA&M).
- Able to implement security controls consistent with DoD IA architectures and policies, employing standard system engineering methodologies and security engineering principles.
- Able to ensure compliance with DoD STIG, Information Assurance Vulnerability Alert (IAVA) compliance, and NIST 800-53 standards to prevent and identify vulnerabilities and implement corrective actions.
- Proficient in Microsoft Office products including Outlook, Excel, Word, and PowerPoint.
Desired Experience and Qualifications:
Previous experience working with this customer
10 Years of specialized experience
Related certifications
- Click here to read more about how we protect your information