CONTINUOUS MONITORING AND AUTHORIZATION jobs in WASHINGTON DC, United Kingdom #3

systems (IS) risk assessments, continuous monitoring, and design of security mitigation or remediation solutions... a successful Authority to Operate (ATO) assessment and authorization of system process. On our team, you will participate in information...

Booz Allen Hamilton

, but are not limited to: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security... IS lifecycle Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis...

ManTech

a DevOps continuous integration/continuous deployment (CI/CD) environment. Design the architecture for an enterprise.... Responsible for capacity, storage planning, and database performance, and monitoring and managing all installed systems...

ManTech

organizations’ continuous monitoring and ongoing authorization programs. Establishes a framework by which cyber risk can be measured.... Verifies security systems by developing and implementing test scripts. Maintains security by monitoring and ensuring compliance...

Peraton

related to authorization, assessment, and continuous monitoring. Identify inefficiencies and compliance gaps, recommending...

Gunnison Consulting Group Inc

related to authorization, assessment, and continuous monitoring. Identify inefficiencies and compliance gaps, recommending...

Gunnison Consulting Group Inc

-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices... measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position...

RedTrace Technologies

processes, and other tasks required for continuous monitoring activities within a cloud environment. The ideal candidate... 800-144, NIST SP 800-145, NIST SP 800-146, Federal Risk and Authorization Management Program (FedRAMP) security control...

Coalfire

processes, and other tasks required for advanced-level continuous monitoring activities and designing security capabilities. The...) To include SP-800-37, NIST SP 800-144, NIST SP 800-145, NIST SP 800-146, Federal Risk and Authorization Management Program...

Coalfire

following activities: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security... IS lifecycle. Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis...

ClearFocus Technologies

continuous monitoring of implemented security controls to ensure that they are implemented correctly, operating as intended... planning and management of all phases of the Risk Management Framework (RMF) Security Assessment and Authorization (SAA...

Coalfire

with expertise in Federal Risk and Authorization Management Program (FedRAMP) and Impact Level 4 (IL4) compliance. The ideal... encryption, access controls, auditing, and monitoring. Assess and mitigate risks associated with network infrastructure...

Elevance Health

. Conduct continuous monitoring to include maintenance of current ATO, monitoring compliance, conducting assessments, conducting... assessments and developing all deliverables within a system authorization package. Must have knowledge of hybrid (on-premise...

Business Performance Systems, LLC

and remote assessments (if applicable) Conduct FISMA systems Continuous Monitoring implementation and assessment Validate... Authorization & Assessment (A&A) for the annual FISMA systems assessment Establish the schedule and resources for the A&A of the...

Hummingbirds Innovations

model), annual Security Assessment and Authorization (SA&A), and Information System Continuous Monitoring (ISCM). Develop... Provide support to the continuous monitoring process, assessing and evaluating Information System (Hardware and Software...

Criterion Systems

and architectures, including those for IoT or OT devices. Support Assessment and Authorization (A&A) cybersecurity reviews, identify... monitoring occurs). Advise system engineers on the best methods to remediate vulnerability findings through the use of security...

Logistics Management Institute

, but are not limited to: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security... IS lifecycle Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis...

ManTech