Freedom

Security Control Assessor – Subject Matter Expert

Freedom

contract

Posted on:

Location Type: Remote

Location: United States

Visit company website

Explore more

AI Apply
Apply

About the role

  • Ease Learning is seeking a qualified Subject Matter Expert (SME) with applied, real-world experience in Security Control Assessor to participate in a skills assessment validation engagement.
  • Complete a practitioner-level skills assessment used for validation and standard-setting purposes.
  • Complete a short post-assessment survey providing feedback on the assessment experience.
  • This role does not involve teaching, instructional design, content creation, or ongoing advisory responsibilities.

Requirements

  • The SME should be a current practitioner with applied, real-world experience related to the following knowledge areas and skills:
  • Develop methods to monitor and measure risk, compliance, and assurance efforts
  • Develop specifications ensuring risk, compliance, and assurance efforts conform with security, resilience, and dependability requirements
  • Draft statements of preliminary or residual security risks for system operation
  • Maintain information systems assurance and accreditation materials
  • Monitor and evaluate system compliance with IT security, resilience, and dependability requirements
  • Conduct Privacy Impact Assessments (PIA) for appropriate security controls protecting PII
  • Perform validation steps comparing actual results with expected results and analyze differences
  • Plan and conduct security authorization reviews and assurance case development
  • Provide accurate technical evaluation of software, systems, or networks documenting security posture and vulnerabilities
  • Recommend new or revised security, resilience, and dependability measures based on review results
  • Verify application/network/system security postures are implemented as stated and document deviations
  • Develop security compliance processes and/or audits for external services (e.g., cloud providers, data centers)
  • Knowledge of computer networking concepts, protocols, and network security methodologies
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk)
  • Knowledge of cybersecurity principles, cyber threats, and vulnerabilities
  • Knowledge of cyber defense and vulnerability assessment tools, including open source tools
  • Knowledge of organization's evaluation and validation requirements
  • Knowledge of cybersecurity principles used to manage risks related to use, processing, storage, and transmission of data
  • Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins
  • Knowledge of IT security principles and methods (e.g., firewalls, DMZs, encryption)
  • Knowledge of current industry methods for evaluating and implementing IT security assessment and monitoring tools
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, XSS, SQL injection)
  • Skill in determining how a security system should work including resilience and dependability capabilities
  • Skill in discerning protection needs (security controls) of information systems and networks
  • Knowledge of network security architecture concepts including topology, protocols, components (e.g., defense-in-depth, Zero Trust)
  • Knowledge of relevant laws, policies, procedures related to critical infrastructure
  • Knowledge of risk assessments and authorization per Risk Management Framework processes
  • Knowledge of penetration testing principles, tools, and techniques
  • Knowledge of security architecture concepts and enterprise architecture reference models
  • Knowledge of security models (e.g., Bell-LaPadula, Biba, Clark-Wilson)
Benefits
  • This is a flat-fee engagement, paid upon successful completion of the assessment and survey
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
Security Control AssessorRisk managementPrivacy Impact Assessments (PIA)Security compliance processesCybersecurity principlesPenetration testingNetwork security methodologiesSecurity architecture conceptsValidation steps analysisInformation systems assurance