The most security-conscious organizations trust Telos Corporation to protect their vital IT assets. The reputation of our company rests on the quality of our solutions and the integrity of our people. Explore what you can bring to our solutions in the areas of cyber, cloud and enterprise security.
Be a part of the Telos culture and see what sets us apart! Telos offers an excellent compensation package with benefits that include generous paid time off, medical, dental, vision, tuition reimbursement, and 401k. Our employees enjoy more than just a great work environment!
This position is contingent upon contract award
Conduct verification and validation for security compliance of low and moderately complex information systems, products, and components. Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures. Provide identification of non-compliance of security requirements and possible mitigations to requirements that are not in compliance. Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and guidelines for usage.
Responsibilities:
Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures Conduct on-site evaluations Conducts verification and validation for security compliance of low and moderately complex information systems, products, and components Provide identification of non-compliance of security requirements and possible mitigations to requirements that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system Facilitate penetration testing Provide a comprehensive verification and validation report (certification report) for the information system