Tuesday, November 28, 2023 04:03 Sign In

Cybersecurity Specialist Sr – Component Assessments Lead/SME

Back to Directory


  • Manage Assessment Schedule Forecasting system assignments for assessments for contract staff and stakeholders
  • Create and manage all artifacts related to a specific security assessment (Rules of Engagement, Security Requirements Traceability Matrix, and other supporting artifacts).
  • Create, manage, and utilize Assessment Standard Operating Procedures and Testing Templates and ensure that assessments are conducted accurately, efficiently, and consistently
  • Create, manage, and utilize Assessment Guides and Training Materials Documents that assist system stakeholders in preparing for upcoming assessments, which include, but are not limited to, Frequently Asked Questions guides, workflows, and Training Materials
  • Draft Security Assessment Report (SAR) for reviews by the stakeholders to prepare for the Exit conference
  • Manage Assessment Exit Conference Briefing, creating agenda and meeting minutes for the system stakeholders on the results of the Exit conference to determine the final SAR
  • Create Final Security Assessment Report for review by the stakeholders to prepare for the Exit Conference
  • Develop and maintain an overall Security Assessment Schedule that forecasts system assignments for contractor and stakeholder staff over the period of performance. The Assessment schedule needs to include assessments that meet the requirements of current DHS policy. The Ongoing Authorization (OA) systems need to be assessed once a year. The systems not in the OA program need to be assessed at a minimum every three years or when a major change occurs. The schedule must also support new systems utilizing the Authority to Proceed (ATP) memo. The new systems utilizing the ATP process along assess the critical controls before being placed in production and then require a full assessment within one year after receiving the ATP.
  • Develop testing artifacts for each system to include, as appropriate, the technical assessment plan, the Rules of Engagement (ROE), the Security Requirements Traceability Matrix (SRTM), the Security Assessment Report, and any other necessary documentation
  • Update and maintain all testing templates and Standard Operating Procedures (SOP) as needed or on an annual basis per DHS guidelines, utilizing the compliance tool.
  • Create Assessment Guides to assist ISSOs, ISSMs, System Owners, and other stakeholders in preparing for upcoming assessments. This includes but is not limited to Frequently Asked Questions (FAQs) guides, and Training Materials
  • Conduct and review vulnerability scans, review device configurations, and review system architecture. The Contractor will utilize vulnerability assessment tools as provided by the Government. Test tools used to support the assessment process may include but are not limited to Nessus (Vulnerability Scanner), WebInspect (performs web application security testing and assessment), IACS, CSAM, and AppDetective (database vulnerability scanner). These tools are subject to change.
  • Provide advisement and recommendations to the Government for assessment and security best practices, including tools that are used for assessment activities
  • Arrange for physical access to the system, if applicable, with the specific System Owner and the specific facility manager. The system’s Information System Security Officer (ISSO) will provide all contact information. Alternatives to physical access to the system may be utilized if it does not compromise the assessment of the controls needed to be accomplished
  • Conduct an Assessment Kick-off meeting according to the Security Assessment Schedule that reviews the MGMT Compliance requirements, process, and artifacts to prepare the stakeholders for the scheduled assessment
  • Conduct up to two checkpoint reviews after the kickoff and before the planned assessment date to review the status of the artifacts in the compliance tool. Provide the checkpoint information to the assessment division and conduct reviews with the stakeholders as needed. As part of the checkpoint review, the assessor will provide detailed criteria that would result in significant findings on the assessment or prevent the assessors from conducting an accurate statement
  • Conduct an assessment entrance conference according to the Security Assessment Schedule that does a final overview of what is expected during the assessment.
  • Execute the assessment through the review of system security documentation, vulnerability scan results, audit logs, configuration guides, and any other additional materials provided by the system and system stakeholders
  • Document the results of the technical assessments in the draft Security Assessment Report (SAR) with the criteria of the tests, testing methods, findings of the assessment, and recommended mitigations. The draft SAR will be sent to the stakeholders one week before the exit conference as defined in the Security Assessment Schedule.
  • Conduct an assessment exit conference according to the Security Assessment Schedule to review the findings of the draft SAR and address any final agreed changes
  • Based on the results of the exit conference, produce the Final SAR within 5 business days of the conference. The Final SAR will document the results of the technical assessments with the criteria of the tests, testing methods, findings of the assessment, and recommended mitigations
  • Collect and securely store all final materials and media submitted by the system test team according to the SOP in the DHS compliance system. Draft systems assessment may use other DHS MGMT-owned systems as appropriate.


  • At least one of the following:
    • CISSP
    • CISM
    • CRISC
    • CSSP


  • Must have a Bachelor’s Degree in Computer Science or related field
  • At least8 years of relevant work experience
  • Must have an active Top Secret security clearance
  • At least 8 years of NIST Security Control Assessor (SCA) experience
  • CSAM experience
  • Must have led Assessment Teams from planning through execution and finalization of an assessment
  • Capable of working in a fast-paced environment
  • Strong communication skills in both verbal and written form
  • Mastery of control assessment requirements based on the NIST 800-53A
  • Technical expertise in assessing environments such as but not limited to Applications, Operating Systems, Databases, Appliances, Cloud Environments, and Physical Environments to validate a full deployment of a defense-in-depth strategy
  • Deep knowledge of Security Control testing and validation on both technical and policy
  • Extensive experience with the implementation of the National Institute of Standards and Technology (NIST SP) 800 family of publications, particularly those associated with NIST’s Risk Management
  • Extensive experience with evaluating a system, network, or infrastructure security controls against requirements such as Federal Information Security Modernization Act (FISMA), Federal Information Processing Standards (FIPS), DHS policy and NIST, Committee on National Security Systems (CNSS) guidelines
  • Knowledge and experience in gathering and analyzing information, writing, organizing, and presenting complex data and briefings (i.e., trending graphs spreadsheets, data correlation, memorandums, etc…)
  • Possess an understanding of determining when security discrepancies exist through knowledge of Federal/DHS laws, security policies, and current technologies and architectures. These include understanding DHS’s mission, tasks, and deliverables for process improvement, and overall risk management


  • This position requires the candidate to come on-site to the facility twice a week (Tuesday & Thursday), and work can be done remotely. The main facility is located in the National Capital Region within the DC Metropolitan area.


  • Salary is based on the number of years of relevant work experience the candidate has.

Please email your resume to our HR Recruiters