Security Control Assessor (SCA)

Arlington, VA, United States

Full Time Clearance required USD 77K - 175K


At the federal, state, and local level, we transform public policy into programs that change lives.

View company page

Job Description Summary

Maximus is searching for a Security Control Assessor (SCA) to join a DoD program in Arlington, VA. The Security Control Assessor is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by a SAP information system to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).Responsibilities include, but are not limited to: • Collaborate with key stakeholders to ensure security engineering initiatives are aligned with the operational needs within the SAP IT.• Develop specifications to ensure risk, compliance, and assurance efforts conform with confidentiality, integrity, and availability requirements at the software application, system, and network environment level. • Draft statements of preliminary or residual security risks for system operation• Maintain information systems assessment and authorization (A&A) documents.• Monitor and evaluate a system's compliance with information technology (IT) security, resilience, and dependability requirements. • Review Security Impact Analysis (SIA) and identify gaps in security architecture.• Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy. • Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change. • Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks • Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations. • Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth)• Experience in one or more cloud computing services and technologies including but not limited to: AWS/C2S, • Provide oversight to the SAP Community on the latest vulnerabilities and identify remediation efforts• Develop and implement new security mechanisms for the SAP Ecosystem• Identify and select best-in-class threat prevent tools and software for the SAP Ecosystem • Execute special projects as required • Interact with technical leads, developers, and system owners to ensure that all technical requirements are aligned with SAP guidance.• Able to travel 20-30% of the time to local and CONUS sitesRequired Skills & Qualifications: • Must possess an Active TS/SCI clearance.• A Bachelor's degree is required for this position. 4 years of relevant work experience may be considered in lieu of the degree requirement. An Associate's degree and 2 years of relevant work experience may also be considered in lieu of the degree requirement. • 7 or more years of experience implementing Risk Management Framework (RMF)• Minimum seven (7) years of demonstrable DoD security experience in the following: o Understanding of DISA STIGs and Benchmarks o Understanding of tools, e.g., SCAP, ACAS, Vulnerator, HBSS, eMASS o Must have analytical skills to evaluate risk, gather data, conduct security audits, and assess information to make critical decisions affecting network security. o Knowledge of coding languages, intrusion detection, operating systems, security planning and auditing, ethical hacking and other security, programming, and diagnostic tools.Certification Requirements:• DoD 8140 Level 2 (or higher) certification is required and may equate to two (2) years of experience (CISSP, CCNA, CySA+, GISCP, Sec+CE, CND, SSCP etc.…)• Cloud certification is a plus #techjobs #clearance #SAPCIO

Job Summary

Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS040, T4, Band 7

MAXIMUS Introduction

Since 1975, Maximus has operated under its founding mission of Helping Government Serve the People, enabling citizens around the globe to successfully engage with their governments at all levels and across a variety of health and human services programs. Maximus delivers innovative business process management and technology solutions that contribute to improved outcomes for citizens and higher levels of productivity, accuracy, accountability and efficiency of government-sponsored programs. With more than 30,000 employees worldwide, Maximus is a proud partner to government agencies in the United States, Australia, Canada, Saudi Arabia, Singapore and the United Kingdom. For more information, visit

EEO Statement

EEO Statement: Active military service members, their spouses, and veteran candidates often embody the core competencies Maximus deems essential, and bring a resiliency and dependability that greatly enhances our workforce. We recognize your unique skills and experiences, and want to provide you with a career path that allows you to continue making a difference for our country. We’re proud of our connections to organizations dedicated to serving veterans and their families. If you are transitioning from military to civilian life, have prior service, are a retired veteran or a member of the National Guard or Reserves, or a spouse of an active military service member, we have challenging and rewarding career opportunities available for you. A committed and diverse workforce is our most important resource. Maximus is an Affirmative Action/Equal Opportunity Employer. Maximus provides equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disabled status.

Pay Transparency

Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.

Posted Max

USD $175,000.00/Yr.

Posted Min

USD $77,600.00/Yr.
Apply now Apply later
  • Share this job via
  • or

Tags: ACAS Audits AWS CISSP Clearance Cloud CND Compliance DISA DoD DoDD 8140 eMASS Ethical hacking Intrusion detection Monitoring Network security Risk analysis Risk management RMF SAP SCAP Security assessment Security Impact Analysis SSCP STIGs Strategy TS/SCI Vulnerabilities

Perks/benefits: Career development Health care Insurance Transparency

Region: North America
Country: United States
Job stats:  5  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.