What are the responsibilities and job description for the Security Risk Assessor position at JASINT Consulting and Technologies?
Job Description
We are seeking an experienced Security Risk Assessor to join our team at JASINT Consulting and Technologies. As a Security Risk Assessor, you will conduct verification and validation of security compliance for low and moderately complex information systems, products, and components. You will analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures to identify potential security risks and vulnerabilities.
Your responsibilities will include providing identification of non-compliance of security requirements and possible mitigations to requirements that are not in compliance, validating the security requirements of the information system, verifying and validating that the system meets the security requirements, and providing a comprehensive verification and validation report (certification report) for the information system. You will also provide process improvement recommendations and conduct vulnerability assessments of the system.
The ideal candidate will have five (5) years experience in security, systems engineering or system assessment, with recent experience within the last three (3) years in areas such as cybersecurity principles and technology, including access/control, authorization, identification and authentication, PKI, network and enterprise security architecture. A Bachelor's degree in Computer Science, Cyber Security or IT Engineering is required. In lieu of a Bachelor's degree, four (4) additional years of work-related experience may be substituted.
We are seeking an experienced Security Risk Assessor to join our team at JASINT Consulting and Technologies. As a Security Risk Assessor, you will conduct verification and validation of security compliance for low and moderately complex information systems, products, and components. You will analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures to identify potential security risks and vulnerabilities.
Your responsibilities will include providing identification of non-compliance of security requirements and possible mitigations to requirements that are not in compliance, validating the security requirements of the information system, verifying and validating that the system meets the security requirements, and providing a comprehensive verification and validation report (certification report) for the information system. You will also provide process improvement recommendations and conduct vulnerability assessments of the system.
The ideal candidate will have five (5) years experience in security, systems engineering or system assessment, with recent experience within the last three (3) years in areas such as cybersecurity principles and technology, including access/control, authorization, identification and authentication, PKI, network and enterprise security architecture. A Bachelor's degree in Computer Science, Cyber Security or IT Engineering is required. In lieu of a Bachelor's degree, four (4) additional years of work-related experience may be substituted.