Committed to delivering high-quality construction and project management services across various industries.
Recognized for precision and reliability, particularly in infrastructure and industrial projects.
Portfolio includes large-scale government and commercial projects, fostering trust through expertise and innovation.
Key achievements include urban development, transportation infrastructure, and energy solutions, often requiring complex engineering and logistics.
Specializes in providing customized solutions to address specific client challenges effectively.
Adopts cutting-edge construction management technology to enhance project efficiency and delivery.
About the client
About the client
Information not given or found
Role
Description
infosec
technical order
audit reporting
rmf remediation
vulnerability management
threat management
Works with an engineering team to ensure that information security is reflected properly in deployed systems (to include handling Technical Order and Time Compliant Technical Order).
Advises other sections regarding internal controls and security procedures. Prepares activity and progress reports relating to the information systems audit function.
Under general direction, supports all activities relating to RMF control remediation and artifact gathering for specified systems.
Develop information systems assurance programs to include vulnerability and threat management, and control guidelines.
Requirements
bachelor’s
iat level ii
ts/sci
emass
pki
problem solving
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field.
Industry standard information security certifications.
At least 3 years of experience in the field or in a related area.
Strong problem-solving skills and attention to detail.
IAT Level II Certification.
Access to eMASS (system used to log RMF activities) may be required.
Experience with cybersecurity policies and threat mitigation.
Shall have knowledge and experience in cybersecurity tools, network topologies, intrusion detection, PKI, and secured networks.
Experience working in federal or defense environments.
Knowledge of security practices and roles necessary to support networks, software, and hardware deployments and implementation.