Overview
On Site
Full Time
Skills
Innovation
Management
Security Controls
Evaluation
Network Design
ISS
Risk Management Framework
RMF
SAP IMG
ISO 9000
Reporting
SAR
Security Analysis
Documentation
DAO
SAP Concur
Cyber Security
Software Development Methodology
Computer Hardware
Authorization
Continuous Monitoring
Network
3PL
Profit And Loss
SAP
Information Systems
ISSM
SCA
Information Assurance
Security Clearance
Counterintelligence
Security Policy
DoD
Microsoft Word
Microsoft PowerPoint
Microsoft Excel
Regulatory Compliance
Military
Law
Legal
FMLA
Recruiting
Job Details
*This position requires a TS/SCI Clearance and a minimum of two years of Special Access Program Experience*
At System High Corporation-a Top Washington-Area Workplace (The Washington Post, 2023-2025), a Top Workplaces Culture Excellence honoree (April 2025), and a three-time VETS Indexes 3-Star Employer-we protect and advance the nation's most critical missions. As part of our team, you'll tackle complex security challenges across SAP, SCI, and Collateral programs. If you're driven by national security, innovation, and integrity, we want to hear from you.
The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer's area of responsibility.
Performance shall include:
Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure
Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)
Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues
Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization
Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required
Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system
Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary
Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR
Evaluate security assessment documentation and provide written recommendations for security authorization to the Government
Discuss recommendation for authorization and submit the security authorization package to the AO/DAO
Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.
Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy
Assist the Government compliance inspections
Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken
Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)
Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries
Evaluate the effectiveness and implementation of Continuous Monitoring Plans
Evaluate the differences and have a working knowledge of Information Systems and Network Appliances operating at Protection Level 3 (PL3) and Protection Level 4 (PL4)
Differentiate the differences between the various types of Cross-Domain Solutions (CDS)
Assist with joint assessments of Cross-Domain Solutions with other DoD agencies
Experience:
9 - 12 years related experience
Minimum of nine (9) years' experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
Prior performance in the role of ISSO and ISSM or SCA
Education:
Bachelor's degree in a related discipline or equivalent experience (4 years)
Certifications:
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level III or Information Assurance Architect and Engineer Level I within 6 months of the date of hire
Security Clearance:
Current Top-Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Mastery of Microsoft Office (Word, PowerPoint, and Excel)
Must be able to regularly lift 50 lbs.
Additional Information
Warning: Beware of recruitment scams: System High will never request money or personal purchases during the hiring process. Verify all communications come from a systemhigh.com or msg.paycomonline.com email address.
At System High Corporation-a Top Washington-Area Workplace (The Washington Post, 2023-2025), a Top Workplaces Culture Excellence honoree (April 2025), and a three-time VETS Indexes 3-Star Employer-we protect and advance the nation's most critical missions. As part of our team, you'll tackle complex security challenges across SAP, SCI, and Collateral programs. If you're driven by national security, innovation, and integrity, we want to hear from you.
The SCA is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an IS to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system). SCAs also provide an assessment of the severity of weaknesses or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. Responsibilities will cover Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities within the customer's area of responsibility.
Performance shall include:
Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing SAP network infrastructure
Perform assessment of ISs, based upon the Risk Management Framework (RMF) methodology in accordance with the Joint Special Access Program (SAP) Implementation Guide (JSIG)
Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues
Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization
Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required
Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for the information on a system
Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary
Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR
Evaluate security assessment documentation and provide written recommendations for security authorization to the Government
Discuss recommendation for authorization and submit the security authorization package to the AO/DAO
Assess proposed changes to Authorization boundaries operating environment and mission needs to determine the continuation to operate.
Review and concur with all sanitization and clearing procedures in accordance with Government guidance and/or policy
Assist the Government compliance inspections
Assist the Government with security incidents that relate to cybersecurity and ensure that the proper and corrective measures have been taken
Ensure organization are addressing and conducting all phases of the system development life cycle (SDLC)
Evaluate Hardware and Software to determine security impact that it might have on Authorization boundaries
Evaluate the effectiveness and implementation of Continuous Monitoring Plans
Evaluate the differences and have a working knowledge of Information Systems and Network Appliances operating at Protection Level 3 (PL3) and Protection Level 4 (PL4)
Differentiate the differences between the various types of Cross-Domain Solutions (CDS)
Assist with joint assessments of Cross-Domain Solutions with other DoD agencies
Experience:
9 - 12 years related experience
Minimum of nine (9) years' experience in SAP, SCI or Collateral Information Systems (IS) Security and the implementation of regulations identified in the description of duties.
Prior performance in the role of ISSO and ISSM or SCA
Education:
Bachelor's degree in a related discipline or equivalent experience (4 years)
Certifications:
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level III or Information Assurance Manager Level III or Information Assurance Architect and Engineer Level I within 6 months of the date of hire
Security Clearance:
Current Top-Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Mastery of Microsoft Office (Word, PowerPoint, and Excel)
Must be able to regularly lift 50 lbs.
Additional Information
- This job description is not designed to cover or contain all job duties required of the employee. There may be additional activities, duties and/or responsibilities that are required for this position that are not listed in this job description.
- In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.
- System High is a Military friendly employer. Our extensive work on behalf of the U.S. government offers those who have served in uniform an opportunity to continue to serve their country in a new and exciting way while enjoying a successful civilian career.
- System High values the power and strength of diverse backgrounds on the culture and performance of our company. We strive to maintain an inclusive culture to encourage each employee to bring their whole self to the mission.
- System High Corporation is committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender, gender identity or expression, veteran status, or any other characteristic protected by law. We are proud to be an equal opportunity workplace.
- If you require a reasonable accommodation to apply for a position with us, please email .
- Legal notices can be viewed on the following PDFs: Know Your Rights: Workplace Discrimination is Illegal; EPPA Notice; FMLA Notice
Warning: Beware of recruitment scams: System High will never request money or personal purchases during the hiring process. Verify all communications come from a systemhigh.com or msg.paycomonline.com email address.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.