Job Description
The Information Security Assurance Lead serves as the senior technical and management authority for Information Assurance (IA) and cybersecurity compliance efforts. This role provides expert-level oversight across Assessment & Authorization (A&A), Risk Management Framework (RMF), FISMA compliance, FISCAM audits, and overall IT security posture. The Lead is responsible for supervising IA personnel, coordinating security activities with stakeholders, and ensuring systems maintain Authority to Operate (ATO) and Authority to Connect (ATC).
This position requires deep technical acumen, leadership capabilities, and hands-on experience developing, maintaining, and governing enterprise-level security programs within Federal environments.
Key Tasks & Responsibilities
β’ Leadership
β’ Serve as the Team Lead, providing daily task direction, technical guidance, scheduling, and performance oversight for IA personnel.
β’ Maintain expertise in emerging cybersecurity technologies, policies, and federal compliance standards.
β’ Lead the planning, initiation, and execution of IT security projects, ensuring adherence to scope, deadlines, and cost targets.
β’ Act as liaison between technical teams, program leadership, auditors, and Government stakeholders.
β’ Provide advanced documentation development including installation guides, SOPs, troubleshooting procedures, vulnerability management reports, and configuration standards.
β’ Provide expert-level technical and management leadership on complex cybersecurity tasks and programs.
β’ Develop and implement security strategies supporting mission objectives and enterprise risk posture.
β’ Direct major activities related to financial management, staffing, and security compliance.
β’ Conduct strategic analysis, evaluations, and recommendations to improve system security, efficiency, and compliance.
β’ Lead studies, surveys, data analysis, and problem identification initiatives, providing actionable recommendations to the Government.
β’ Risk Management Framework (RMF)/Assessment & Authorization (A&A)
β’ Perform and manage all RMF steps to obtain and sustain ATO/ATC for systems in compliance with DoD and DIA requirements.
β’ Conduct periodic security assessments in accordance with DoD RMF, FISMA, and JWICS-related requirements.
β’ Develop and maintain all required RMF artifacts, including:
β’ Security Categorization
β’ System Security Plan (SSP)
β’ Control Validation/Implementation documentation
β’ Implementation Plan
β’ Plan of Action and Milestones (POA&M)
β’ Acceptance of Risk (AOR)
β’ Security Override Letter (SOL)
β’ RMF package and Scorecard
β’ Deliverables
β’ Standard Operating Procedures (SOPs)
β’ Incident Response Plan (IRP)
β’ Continuity of Operations Plan (COOP)
β’ Configuration Management Plan (CMP)
β’ Appointment memos
β’ DD2875s
β’ Current ATO, ATC, and ATO with Conditions
β’ Network diagrams and supporting technical documentseMASS Responsibilities
β’ Maintain system records in eMASS in accordance with DoD RMF and FISMA requirements.
β’ Ensure all required artifacts, test results, and compliance actions are accurately entered into eMASS.
β’ Coordinate with the CIO Validator for all RMF actions and approvals.
β’ Maintain and track the ATO Status Process Calendar, ensuring all action items meet required compliance dates.FISMA Compliance
β’ Perform annual control testing, evidence collection, and compliance analysis.
β’ Support internal and external FISMA reviews and assessments.FISCAM Audit Support
β’ Document and validate IT general controls applicable to the CCE infrastructure.
β’ Support FISCAM audits and self-assessments; test and record results of annual IT general controls testing.
β’ Update and enhance process documentation to address deficiencies identified during audits.Security Monitoring & Protection
β’ Plan, implement, upgrade, and monitor security controls to protect information systems and data.
β’ Ensure appropriate safeguards are in place to protect digital assets and infrastructure.
β’ Respond to security incidents, breaches, and vulnerabilities in accordance with approved procedures.
β’ Coordinate mitigation strategies for all non-compliance issues. Desired Skills and Experience
β’ Expertise in federal cybersecurity frameworks including RMF, FISMA, NIST 800-series, and FISCAM.
β’ Experience working with DoD, DIA, or IC security compliance programs.
β’ Strong leadership skills and experience managing technical cybersecurity teams.
β’ Excellent written and verbal communication skills for technical documentation and stakeholder engagement.
β’ Proficiency with eMASS, vulnerability management platforms, configuration management tools, and audit tracking systems.
Education & Experience
β’ Minimum Education
β’ Bachelorβs degree in a related field required.
β’ Minimum General Experience
β’ Ten (10) years of experience in Information Technology.
β’ At least eight (8) years of experience as a Security Administrator or in a similar technical role, or a closely related IT discipline involving oversight of large, complex, multi-site programs.
Certifications
β’ CISSP or equivalent required
β’ Information Assurance Technical (IAT) II required
β’ Computing Environment (CE) certification relevant to Microsoft, Linux, Cloud, or other privileged access technologies (required)
β’ ITIL Required
β’ Must maintain all mandatory certifications.
Security Clearance
β’ Must be a U.S. Citizen.
β’ Selective Service registration required (if applicable).
β’ Top Secret Security Clearance required
β’ Must maintain fitness and eligibility for national security positions.
Other (Travel, Work Environment, DoD 8570 Requirements, Administrative Notes, etc.)
β’ Onsite at customer location
Computer World Services is an affirmative action and equal employment opportunity employer. Current employees and/or qualified applicants will receive consideration for employment without regard to race, color, religion, sex, disability, age, sexual orientation, gender identity, national origin, disability, protected veteran status, genetic information or any other characteristic protected by local, state, or federal laws, rules, or regulations.
Computer World Services is committed to the full inclusion of all qualified individuals. As part of this commitment, Computer World Services will ensure that individuals with disabilities (IWD) are provided reasonable accommodations. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact Human Resources at [Upgrade to PRO to see contact].