|Date Posted||June 24, 2020|
Business Group Highlights
The Defense group supports the Department of Defense (DoD) mission to keep our homeland and its citizens safe. We provide solutions to improve the Nation's defense by providing software, systems engineering, IT, training and logistics and fleet management solutions.
Provide Cyber Security expertise, including feasibility studies, technical evaluation, justification, acquisition/procurement, installation, implementation, management, and administration of IT systems including virtualized infrastructures and systems (ex. VMWare and OpenStack). Provide technical support to Information Systems Security Managers (ISSM) and ISSOs throughout the CCoE. Maintain the CCOE security posture with proper certification and accreditation procedures/documentation/mitigation through continuous monitoring of CAT Is and II/III findings. Assist in the administration of an effective Cyber Security program that involves providing management of organizational risk advice, guidance, and assistance. Stay abreast on changes to Joint, DOD and Army doctrine as it pertains to cyber security and risk management. Maintain up-to-date on IT news regarding network security and future trends in Cyber Security (ex. cloud computing security). Update, maintain and test the Disaster Recovery Plan and Continuity of Operation (COOP) to reflect changes in the IT environment. Assist in the coordination of vulnerability assessments, inspections, tests and reviews of the CCoE’s information systems and processes. Generate and/or coordinate the compiling of all document deliverables required for Certification & Accreditation (C&A) utilizing RMF methodology Process, track and manage C&A packages into applicable systems (ex. eMASS). Identify information protection needs for the Network Environment (NE). Define NE security requirements in accordance with applicable IA requirements. Provide system related input on IA security requirements to be included in statements of work and other appropriate procurement documents. Develop Cross Domain Solution (CDS) for use within a Computing Environment (CE) or NE. Develop and implement security designs for new or existing network system(s). Design of hardware, operating systems, and software applications adequately address IA security requirements for the NE. Design, develop, and implement network security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation. Design, develop, and implement specific IA countermeasures for the NE. Develop interface specifications for the NE. Develop approaches to mitigate NE vulnerabilities and recommend changes to network or network system components as needed. Ensure that network system(s) designs support the incorporation of DoD-directed IA vulnerability solutions, e.g., IAVAs. Ensure compliance with IA architectures and designs for DoD IS with medium integrity and availability requirements, to include MAC II, systems with a medium Level-of-Concern for availability or integrity in accordance with Reference (vu), and other DAA designated systems. Develop IA architectures and designs for JWICS and DIA systems processing Sensitive Compartmented Information (SCI). Assess threats to and vulnerabilities of the NE. Identify, assess, and recommend IA or IA-enabled products for use within an NE; ensure recommended products in compliance with the DoD evaluation and validation requirements. Ensure that the implementation of security designs properly mitigate identified threats. Assess the effectiveness of information protection measures used by the NE. Evaluate security architectures and designs and provide input as to the adequacy of security designs and architectures proposed or provided in response to requirements contained in acquisition or MILCON/MCA documents. Ensure security deficiencies identified during security/certification testing have been mitigated, corrected, or a risk acceptance has been obtained by the appropriate DAA or authorized representative.
Requires 10 to 12 years with BS/BA or 8 to 10 years with MS/MA or 5 to 7 years with PhD.
What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sector—from investigative services and IT strategy to systems work and next-generation engineering.
Our promise is simple: never stop solving our nation’s most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to do just that, as a partner of choice across the entire sector.
Perspecta is anAA/EEO Employer - Minorities/Women/Veterans/Disabled and other protected categories.
As a government contractor, Perspecta abides by the following provision
PAY TRANSPARENCY NONDISCRIMINATION PROVISION
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)