Committed to delivering high-quality construction and project management services across various industries.
Recognized for precision and reliability, particularly in infrastructure and industrial projects.
Portfolio includes large-scale government and commercial projects, fostering trust through expertise and innovation.
Key achievements include urban development, transportation infrastructure, and energy solutions, often requiring complex engineering and logistics.
Specializes in providing customized solutions to address specific client challenges effectively.
Adopts cutting-edge construction management technology to enhance project efficiency and delivery.
About the client
About the client
Information not given or found
Role
Description
info security
system deployment
rmf remediation
audit reporting
security controls
vulnerability management
Works with an engineering team to ensure that information security is reflected properly in deployed systems (to include handling Technical Order and Time Compliant Technical Order).
Responsible for all activities relating to RMF control remediation and artifact gathering for specified systems.
Prepares activity and progress reports relating to the information systems audit function.
Advises other sections regarding internal controls and security procedures.
Develop information systems assurance programs to include vulnerability and threat management, and control guidelines.
Requirements
bachelor's
iat
ts/sci
emass
pki
5+ years
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a related field.
Industry standard information security certifications.
IAT or IAM Level II Certification.
Strong problem-solving skills and attention to detail.
At least 5 years of experience in the field or in a related area.
Access to eMASS (system used to log RMF activities) may be required.
Experience with cybersecurity policies and threat mitigation.
Shall have knowledge and experience in cybersecurity tools, network topologies, intrusion detection, PKI, and secured networks.
Experience working in federal or defense environments.
Knowledge of security practices and roles necessary to support networks, software, and hardware deployments and implementation.