Peraton Overview Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.
We are an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law.
As a government contractor, Peraton abides by the following provision
Pay Transparency Nondiscrimination ProvisionThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information. 41 CFR 60-1.35(c).
Qualifications Required: Requires BS 8-10, MS 6-8, PhD 3-5
Current U.S. Government Top Secret/ SCI with Poly
Bachelors of Science Degree in Science, Technology, Engineering or Mathematics (STEM) or an advanced IA certification
DoD 8570 certification in IAT or IAM
Experience implementing RMF Process and NIST 800-53 technical controls, as well as developing and maintaining associated certification and accreditation documentation
Desired: Self-starter requiring limited direction and supervision
Experience briefing senior customer personnel
Ability to organize and prioritize numerous customer requests in a fast pace deadline driven environment
Familiarity with Amazon Web Services (AWS)
Familiarity with customer's IA processes
Experience with Xacta
Familiarity with Cross Domain Systems (CDS)
Experience supporting IC or DoD in the Cyber Security Domain
Responsibilities The program provides Systems Engineering and Technical Assistance (SETA) support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts support functions are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.
Position Description:The Delegated Authorizing Official Representative (DAO-R) provides support to the customer in the area of Cyber Security. Daily tasks include, but are not limited to:
- Ensure adherence to ICD-503 and customer specific directives/policies through the lifecycle (RMF 1-6) of customer sponsored assets
- Provide risk recommendations to the customer after reviewing sponsored asset overall risk posture as part of Authority to Operate (ATO) RMF process
- Manage/track customer sponsored assets plan of action and milestones (POAMs) by working with various security stakeholders (ISSO/ISSE/ISSM/SCA) post authorization
- Screen new asset requests to ensure sponsorship and information system owner identification
- Facilitate System Review Team to ensure that new/existing customer sponsored assets have the correct project regulation, data types/C-I-A impact assignments, and overlay assignments as well (with customer signoff)
- Assign asset security controls and levy asset specific liens on controls for which the program did not meet during accreditor reviews
- Ensure customer sponsored assets maintain their security postures in accordance with customer identified Continuous Monitoring (RMF step 6) directives and policies
- Provide continuous adhoc authorization-related daily support to both customer and programs