IT Security Specialist (Secret Clearance)

Overview

On Site
$120,000 - $145,000
Full Time
No Travel Required

Skills

Secret Clearance
DoD IAT Level 1 Certification
system configuration
NIST
RMF
CSAM
JCAM
XACTA
eMASS
Risk Management
Security Auditing
COnfiguration Management
Federal Policies

Job Details

Role Overview:

As an IT Security Specialist, you ll be responsible for managing and controlling the secure configurations of over 200 information systems in alignment with NIST 800-128 and broader federal security standards. You'll lead SecCM initiatives, ensuring that information security controls are seamlessly integrated into system configurations and broader business functions.

Role Highlights:

Position: IT Security Specialist

Location: Arlington, VA (5 days onsite, M F)

Terms: 3-Month Contract-to-Hire (long-term opportunity)

Clearance: Active Secret or Top Secret clearance required

Key Responsibilities:

  • Manage secure configurations for 200+ information systems
  • Apply NIST 800-128 and federal policies to configuration management processes
  • Identify and document security-impacting configurations
  • Evaluate security risks before approving configurations
  • Analyze and document the impact of system changes
  • Conduct configuration and IT security audits
  • Support SecCM (Security-Focused Configuration Management) planning and policy development
  • Conduct qualitative/quantitative research and analysis
  • Compile findings into white papers, reports, and presentations
  • Ensure integration of SecCM requirements into business functions and IT systems

Key Requirements:

  • Bachelor s Degree
  • 5+ years managing large-scale security projects (cost, schedule, and performance)
  • Strong experience in secure system configuration management for federal systems
  • Deep knowledge of NIST standards, RMF, and tools such as CSAM/JCAM, XACTA, or eMASS
  • Ability to obtain a DOD 8570 Level 1 certification within 6 months

Preferred Skills:

Current DOD 8570 Level 1 certification

Broad understanding of cybersecurity threats and technologies

Experience with security policy development

Strong research and documentation skills

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.