What are the responsibilities and job description for the Lead Information Security Analyst position at Tangent Technologies LLC?
Note: Tangent Technologies is currently bidding on this work. This position is contingent upon contract award.
Key Responsibilities:
Lead the design, development, and writing of comprehensive Certification & Accreditation (C&A) documentation packages for Authority to Operate (ATO) submissions.
Oversee AES CISA HVA assessments, applying risk-based methodologies to evaluate system security posture and recommend remediation strategies.
Ensure compliance with NIST SP 800-37, 800-53, RMF, and other relevant federal cybersecurity standards and frameworks.
Direct and execute cybersecurity supply chain risk management activities aligned with federal requirements and best practices.
Conduct risk assessments, control evaluations, vulnerability management, and mitigation planning across complex environments.
Perform quality control reviews of contractor deliverables, processes, and risk assessments to ensure adherence to standards and continuous improvement.
Lead integrated project teams to develop work breakdown structures, schedules, and resource plans that align with cybersecurity goals.
- Collaborate with stakeholders, including federal clients, technical teams, and executive leadership, to communicate risk, progress, and compliance status.
Minimum Qualifications:
Education: Bachelor’s Degree in Cybersecurity, Information Systems, Computer Science, or a related field.
Experience:
10 years of progressive Information Security experience
5 years in a lead cybersecurity role supporting federal clients
5 years working with cybersecurity supply chain risk management and developing work breakdown schedules
4 years conducting quality control reviews, process improvement initiatives, and risk assessment support
Certifications (Required):
PMP (Project Management Professional)
CISSP (Certified Information Systems Security Professional)
AES CISA HVA Assessment Lead certification
Knowledge of:
Federal Information Security Management Act (FISMA)
FedRAMP, CISA mandates, and DoD RMF practices
High Value Asset (HVA) protection and AES audit protocols
Security documentation lifecycle and vulnerability assessment tools