×
Register Here to Apply for Jobs or Post Jobs. X

Senior Technical Assessor

Job in Sterling, Loudoun County, Virginia, 22170, USA
Listing for: SkyePoint Decisions, Inc.
Full Time position
Listed on 2026-01-01
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Job Description & How to Apply Below

Overview

SkyePoint Decisions is a leading Cybersecurity Architecture and Engineering, Critical Infrastructure and Operations, and Applications Development and Maintenance IT service provider headquartered in Dulles, Virginia with operations across the U.S. We provide innovative enterprise-wide solutions as well as targeted services addressing the complex challenges faced by our federal government clients. Our focus is on enabling our clients to deliver their mission most efficiently and effectively - anytime, anywhere, securely.

We combine technical expertise, mission awareness, and an empowered workforce to produce meaningful results.

Join the SkyePoint team and become part of a highly skilled, professional workforce dedicated to delivering mission-critical solutions. Our exceptional technical experts provide innovative services and solutions to federal agencies, making a meaningful impact every day. At SkyePoint, we value top talent and foster an environment where your ideas and contributions truly matter. Be part of a team that values excellence and rewards innovation-your future starts here!

This is a contingent position based upon customer approval.

Responsibilities

SkyePoint Decisions, Inc. is seeking a highly motivated team member to fill the role of a Senior Technical Assessor for a government contract. This person will lead comprehensive security assessments and ensure compliance with federal cybersecurity standards. This role is critical in evaluating, validating, and documenting security controls across systems to maintain a robust security posture and meet regulatory requirements.

Responsibilities:

  • Establish and satisfy information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands.
  • Conduct a comprehensive assessment of implemented controls and control enhancements to determine the effectiveness of the controls, i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security and privacy requirements for the system and the organization.
  • Schedule and lead System Assessments out‑briefs with different stakeholders and provide SAP, SAR, security recommendations and system certifications.
  • Prepare security, privacy, and supply chain assessment reports containing the results and findings from the assessment.
  • Provide an assessment of the severity of the deficiencies discovered in the system, environment of operation, and common controls and recommend corrective actions to address the identified vulnerabilities.
  • Develop and execute a comprehensive Security Controls Test (SCT) plan that details all assessment activities, including required vulnerability scans and penetration testing aligned with DHS RVA standards, guidelines, and templates. The plan should define coordination requirements, scope of controls, and any special interest items to be assessed.
    • Final Analysis Report and Executive Briefing for the CISO
    • Support for Authorizing Official (AO) briefing
    • Summary of Findings and Detailed Findings Report
    • POA&M Injection Template for remediation tracking
  • Create or update a 3-year OSA test plan for each system that includes the most recent versions of NIST SP 800‑53 control tests and any additional tests required for OSA. A subset of the controls will be tested or assessed each quarter so that all controls will be tested or assessed at least once during a three‑year period.
  • Complete and maintain an OSA master project schedule by using NIST assessment methods and approved OSA procedures.
  • Create or update program management documentation that include rules of engagement, schedules, annual document reviews, process for POA&M and accepted risk reviews.
  • Ensure that appropriate vulnerability and penetration tests are scheduled, conducted, analyzed, and presented to the system owner ad information systems security officer (ISSO).
  • Meet with the system ISSO(s) [as needed], systems contractors and the POAM Team, to develop mitigation strategies and identify acceptable evidence criteria to close deficiencies. For all security deficiencies found during a test cycle,…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary