Company name: RLM Communications, Inc.

Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established IA standards and regulations, and recommend mitigation strategies
Validate and verify system security requirements definitions and analysis and establishes system security designs
Design, develop, implement and/or integrate IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements
Build IA into systems deployed to operational environments
Assist architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application security policy and enterprise solutions
Support the building of security architectures
Enforce the design and implementation of trusted relations among external systems and architectures
Assess and mitigate system security threats/risks throughout the program life cycle
Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations
Review certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content
Perform system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of operational IA and CND systems
Apply system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security testing.
Research and evaluate new concepts and processes to improve performance. Analyzes cross-functional problem sets, identifies root causes and resolves issues. Assists more junior level technicians, specialists, and managers in their activities. Performs all tasks of lower level technicians, specialists, and/or managers.
Work individually, actively participates on integrated teams, and leads multiple tasks, projects or teams. Oversees and monitors performance, and when required, takes steps to resolve issues.
Direct multiple teams through to project completion. Provides guidance and direction to lower level technicians, specialists, and managers.
Perform system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements. Provide security planning, assessment, risk analysis, and risk management. Recommend system-level solutions to resolve security requirements. Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures. Perform certification and accreditations by reviewing documentation and providing recommendations.
HS/GED + 10 years; or
Associates Degree + 8 years; or
Bachelor’s Degree + 6 years; or
Master’s Degree + 4 years; or
PhD + 2 years
Required Certifications:
CASP CE, CISSP (preferred) or equivalent
Travel: Up to 10%
Clearance: Top Secret with current OR previous SCI access