Company: Guidehouse supporting DEA Role: Security Specialist
Location: Arlington, VA (onsite 5 days per week)
Duration: Contract to Hire Citizenship: US Citizen with active Secret Clearance
Rate: $70 an hour (145k conversion salary no flex on
salary a little flex on hourly)
Top Required Skills
Needs to be able to give
intimate detail about STIG's and configuration management specifically, need to
have an understanding of STIG's settings within Windows and different operating
systems
We need to have them
answer these below questions for them to get an interview. Please send
the answers to these questions over along with their resume
Q1: What are common
elements of Cyber Security?
Q2: What are benefits
in secure configuration management and what do they provide?
Q3: What NIST Special
Publication is used for Security Focused Configuration Management of Systems?
Q4: Explain what is a DISA
STIG and the work you're doing with them?
Q5: What does Security
Focused Configuration Management provide an organization?
looking for an experienced
professional with experience in building, managing, and controlling the secure
configurations of information systems for federal organizations. Your duties
will include managing and controlling secure configurations of over 200 information
systems for a federal client with a critical and high-profile mission in
accordance with NIST 800-128 guidance and applicable federal and organizational
policies to enable security and facilitate the management of risk. You will use
Security-Focused Configuration Management (SecCM) to build on the general
concepts, processes, and activities of configuration management by attention on
the implementation and maintenance of the established security requirements of
the organization and systems. You will ensure information security
configuration management requirements are integrated into (or complement)
existing organizational configuration management processes (e.g., business
functions, applications, products) and information systems. Additional SecCM
duties and activities include:
Identification
and recording of configurations that impact the security posture of the
system and the organization.
The
consideration of security risks in approving the initial configuration.
The
analysis of security implications of changes to the system configuration.
Documentation
of the approved/implemented changes.
Qualitative
and quantitative research to support work assignments for meeting the
deliverable objective.
Qualitative
and quantitative analyses for assigned tasks.
Compilation
of research, findings, and other information into written formats such as
white papers, reports, presentations, and other forms of technical
documentation
Participation
in policy development for configuration management.
Configuration
management planning and management.
Configuration
identification.
Configuration
management and IT security audits.
Information
Locations Position Open to Only localsIndustry Information TechnologyStatus OpenJob Age 54 Day'sCreated Date 12/05/2025No.of Positions 1Duration 6 monthsZip Code