Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Security Control Assessor (SCA) image - Rise Careers
Job details

Security Control Assessor (SCA)

Ready to Ignite your career and work alongside some of the most innovative and brightest professionals in emerging and secure technology? Join us and unleash your potential working in an Agile environment while securing enterprise systems and applications needed to support the men and women charged with safeguarding the American people and enhancing the Nation’s safety, security, and prosperity.  As a Security Control Assessor (SCA) to contribute to our success by ensuring systems meet rigorous security standards. Clearance Level: Top Secret Clearance (SCI Eligibility preferred)

Your Role:

  • Advise the Information System Owner (ISO) on impact levels for Confidentiality, Integrity, and Availability (CIA) for system data.
  • Conduct comprehensive security assessments for each Information System (IS).
  • Initiate and manage POA&Ms, addressing weaknesses with defined timelines and recommendations from the Security Assessment Report (SAR).
  • Evaluate security documentation, providing written recommendations for security authorization to the Chief Information Security Officer (CISO) and Authorizing Official (AO).
  • Assess the impact of system changes, operational environments, and mission requirements on system authorization.
  • Act as a cybersecurity advisor to the CISO and AO, providing expertise on system risks and mitigations.
  • Contribute to the development of continuous monitoring strategies at the system level, aligning with DoD and Component-level frameworks.
  • Document and rate noncompliant security controls, identifying aggregate risk levels in the SAR and key risk drivers.
  • Develop tailored continuous monitoring plans for each IS to ensure ongoing security compliance.

 

  • Education: Bachelor's degree or higher (relevant experience can substituted for Education).
  • Experience: 12+ years of IT experience, including 7 years of relevant security experience.
  • Certifications: DOD 8140 IAM Level II (CAP, CASP, CISM, CISSP, GSLC, CCISO).
  • Clearance: Active Top-Secret Clearance (SCI eligibility preferred).
  • Strong knowledge of Risk Management Framework (RMF) NIST 800-37 and continuous monitoring (NIST 800-137).
  • Hands-on experience with FISMA, NIST 800-series, FIPS, SA&A processes, vulnerability/patch management, and POA&M policies.
  • Proficiency with Microsoft Word, Excel, PowerPoint, and vulnerability scanning tools.
  • Expertise in cloud-based security authorizations (FedRamp, AWS, Azure) and CSAM tools.
  • Demonstrated experience documenting security materials (SSPs, SARs, SAPs).

Preferred:

  • Experience assessing cloud security authorizations and interpreting risk postures from assessment reports.
  • Additional cybersecurity certifications at IAM-III level.
  • Strong project management and executive briefing experience.

  • 401(k) with matching and 100% Vested
  • Health Insurance - 3 plans to select from
  • Dental insurance
  • Vision Insurance
  • Health savings account
  • Life insurance
  • Short Term Disability
  • Long Term Disability
  • AD&D
  • Paid time off
  • Professional development assistance
  • Training
  • Tuition reimbursement
  • Flexible schedule
  • Flexible spending account
  • Referral program
  • Paid Legal Plan
  • and more....

Ignite IT is an Equal Employment Opportunity/Affirmative Action Employer. We evaluate qualified applicants without regard to race, color, religion, sex, national origin, disability, Veteran status, sexual orientation, or other protected characteristic. In accordance with EO 13665 Final Rule, Ignite IT will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant.

Applicants selected must be able to possess and maintain a government clearance

US CITIZENSHIP REQUIRED'

Average salary estimate

$135000 / YEARLY (est.)
min
max
$120000K
$150000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Security Control Assessor (SCA), Ignite

Are you ready to take your career to the next level as a Security Control Assessor (SCA) with Ignite IT? Join a dynamic team of professionals who are dedicated to enhancing national security and supporting those who safeguard our country. In this exciting role, you'll have the opportunity to work in an Agile environment, ensuring enterprise systems and applications meet stringent security standards. Your key responsibilities will include advising Information System Owners on potential risk levels, conducting comprehensive assessments, and managing Plans of Action and Milestones (POA&Ms). You'll evaluate critical security documentation and recommend necessary steps for authorization, all while acting as a trusted advisor to senior leaders on cybersecurity matters. With a focus on continuous monitoring strategies aligned with DoD frameworks, you'll help document and mitigate risks associated with noncompliant security controls. This position requires a Bachelor's degree and over 12 years of IT experience with a strong focus on security. Ideal candidates will have relevant certifications, strong knowledge of the Risk Management Framework (RMF), and hands-on experience with various compliance processes. If you have a Top Secret Clearance and a passion for engineering robust security protocols, Ignite IT is looking for you to lead the charge in protecting our nation's most vital systems. Not only will you make a significant impact, but you'll also enjoy a competitive benefits package including health insurance options, a flexible schedule, and professional development assistance. Come ignite your potential with us!

Frequently Asked Questions (FAQs) for Security Control Assessor (SCA) Role at Ignite
What are the primary responsibilities of a Security Control Assessor at Ignite IT?

As a Security Control Assessor (SCA) at Ignite IT, you will advise on security standards, conduct comprehensive security assessments for Information Systems, manage Plans of Action and Milestones (POA&Ms), and evaluate security documentation. You’ll also act as a cybersecurity advisor to senior management, contributing to strategic decisions regarding system risks and security compliance.

Join Rise to see the full answer
What qualifications are required for the Security Control Assessor position at Ignite IT?

To qualify for the Security Control Assessor (SCA) role at Ignite IT, candidates must possess a Bachelor's degree or equivalent experience, along with 12 years of IT experience, and 7 years of relevant security experience. Additionally, you will need certifications like DOD 8140 IAM Level II and an active Top Secret Clearance, preferably with SCI eligibility.

Join Rise to see the full answer
How does Ignite IT support professional development for Security Control Assessors?

Ignite IT offers a range of professional development assistance for Security Control Assessors, including training opportunities, tuition reimbursement, and access to workshops. This commitment helps employees stay competitive and current in cybersecurity practices and continuously improve their skills.

Join Rise to see the full answer
What security frameworks and compliance processes should a Security Control Assessor at Ignite IT be familiar with?

A Security Control Assessor (SCA) at Ignite IT should have strong knowledge of the Risk Management Framework (RMF) NIST 800-37, as well as familiarity with NIST 800-series guidelines, FISMA, and SA&A processes. Hands-on experience with continuous monitoring and managing vulnerabilities is also highly valuable.

Join Rise to see the full answer
What benefits can Security Control Assessors expect at Ignite IT?

At Ignite IT, Security Control Assessors can look forward to a competitive benefits package that includes health insurance options, dental and vision insurance, a 401(k) plan with matching contributions, paid time off, flexible spending accounts, and more. This diverse range of benefits underscores our commitment to employee well-being and work-life balance.

Join Rise to see the full answer
Common Interview Questions for Security Control Assessor (SCA)
How do you stay updated on the latest cybersecurity threats and compliance regulations?

Staying current in the cybersecurity field requires ongoing education and research. I regularly read industry publications, attend conferences, and participate in professional networks to gain insights on emerging threats and compliance updates relevant to my role as a Security Control Assessor.

Join Rise to see the full answer
Can you describe a time when you identified a significant vulnerability in a system?

In a previous position, I discovered a vulnerability during a routine assessment that could have led to a data breach. I documented my findings in a Security Assessment Report and presented them to management, proposing immediate remediation actions and developing a long-term monitoring strategy to ensure ongoing compliance.

Join Rise to see the full answer
What tools and technologies have you used for security assessments?

I have utilized various vulnerability scanning tools, compliance software, and documentation frameworks. For instance, I've worked extensively with tools aligned with the NIST 800-series and frameworks like FedRAMP for cloud security assessors, enabling thorough evaluations and well-documented reviews.

Join Rise to see the full answer
An Information System Owner disagrees with your assessment of their system's security level. How do you handle the situation?

In such cases, I emphasize open communication and collaboration. I would engage with the ISO to discuss my findings, providing clear documentation and evidence supporting my assessment. Discussing potential risks and listening to their perspective can help us reach a mutual understanding and agree on a path forward.

Join Rise to see the full answer
What is your approach to developing Plans of Action and Milestones (POA&Ms)?

When developing POA&Ms, I prioritize identifying vulnerabilities and assessing their impact on the system. I create clear, measurable action steps with timelines for remediation, assigning responsibilities to appropriate team members. This structured approach ensures accountability and effective tracking of progress.

Join Rise to see the full answer
How do you ensure compliance with the Risk Management Framework (RMF)?

I ensure compliance by conducting thorough assessments, documenting all findings, and maintaining a detailed record of all controls in place. Frequent reviews and updates are vital, as is close collaboration with the Information System Owners to ensure they understand their responsibilities in maintaining compliance.

Join Rise to see the full answer
What strategies do you use for continuous monitoring?

For continuous monitoring, I advocate for implementing automated tools to gather real-time data on system performance and security postures. Regular reviews of security controls and proactive communication with system owners ensure that any issues are addressed promptly and compliance is maintained.

Join Rise to see the full answer
Describe your experience with cloud security assessments.

I have assessed numerous cloud environments, particularly focused on frameworks like FedRamp for AWS and Azure. My methodology includes evaluating the security control baselines, conducting vulnerability assessments, and ensuring that cloud systems meet the requisite compliance standards for continuous monitoring.

Join Rise to see the full answer
How do you assess risk levels for confidentiality, integrity, and availability?

I evaluate risk levels by considering the potential impact on confidentiality, integrity, and availability for system data. This involves not only assessing existing controls but also analyzing potential threats and vulnerabilities, allowing me to develop a comprehensive risk report that informs decision-making.

Join Rise to see the full answer
What is your experience with vulnerability management?

My experience includes implementing comprehensive vulnerability management processes, which encompass identifying, assessing, and prioritizing vulnerabilities across systems. I ensure timely patching and remediation, and I document the findings in reports to maintain transparency and track progress against POA&Ms.

Join Rise to see the full answer
Similar Jobs
Posted yesterday
Posted yesterday
TEECOM Remote Remote - United Kingdom
Posted 13 days ago
Photo of the Rise User
Robinhood Hybrid Menlo Park, CA; Bellevue, WA; New York, New York
Posted yesterday
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Dare to be Different
Reward & Recognition
Fast-Paced
Maternity Leave
Paternity Leave
Medical Insurance
Dental Insurance
Vision Insurance
Mental Health Resources
Life insurance
Disability Insurance
Health Savings Account (HSA)
Flexible Spending Account (FSA)
401K Matching
Paid Holidays
Paid Sick Days
Paid Time-Off
Learning & Development
Social Gatherings
Photo of the Rise User
Chabez Tech Remote Navi Mumbai Metro, Navi Mumbai, Maharashtra, India
Posted 3 days ago
Posted yesterday
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
January 7, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!