%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3ESAIC is seeking a highly qualified and experienced %3Cstrong%3EContract Program Security Officer (CPSO)%3C/strong%3E to oversee and manage the security operations for a Sensitive Compartmented Information Facility (SCIF) in San Diego, CA . The ideal candidate will have extensive experience in building ICD 705 Physical Security construction designs, as well as expertise in TEMPEST requirements and procedures.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cb%3E%3Cu%3E%3Cspan style=%22line-height: 107%;%22%3EResponsibilities:%3C/span%3E%3C/u%3E%3C/b%3E%3Cu%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/u%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3ESecurity Management:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul style=%22text-align: left;%22%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EOversee and enforce security policies, procedures, and protocols to ensure compliance with all relevant regulations and guidelines.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EManage and administer security clearances, briefings, and debriefings.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EConduct security audits, inspections, and investigations to identify and mitigate potential security risks.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3EICD 705 Physical Security:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul style=%22text-align: left;%22%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EDesign and implement physical security measures in accordance with ICD 705 standards to safeguard classified information.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EDevelop and review construction security plans (CSPs) and manage the accreditation process for SCIFs.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3ECollaborate with architects, engineers, and contractors to ensure security requirements are integrated into construction projects.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3ETEMPEST Compliance:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul style=%22text-align: left;%22%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EImplement and oversee TEMPEST measures to prevent compromising emanations from electronic equipment within the SCIF.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EConduct TEMPEST testing and assessments to ensure compliance with applicable standards and guidelines.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EProvide recommendations and solutions for TEMPEST vulnerabilities and coordinate corrective actions.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3ETraining and Education:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul style=%22text-align: left;%22%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EDevelop and conduct security awareness training for personnel with access to classified information.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EStay current with emerging security threats, technologies, and best practices to enhance security posture.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3EIncident Response:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli class=%22MsoNormal%22 style=%22text-align: left; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3ERespond to security incidents, conduct investigations, and implement corrective actions to prevent recurrence.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22text-align: left; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3ECoordinate with internal and external stakeholders, including law enforcement and intelligence agencies, as necessary.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E %3Cp class=%22MsoNormal%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cb%3E%3Cu%3E%3Cspan style=%22line-height: 107%;%22%3ERequired Education and Qualifications:%3C/span%3E%3C/u%3E%3C/b%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cu%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/u%3E%3C!-- [if !supportLists]--%3E%3Cspan style=%22line-height: 107%;%22%3EBachelor%26rsquo;s degree in Security Management, Information Security, or a related field. Four (4) years of additional experience considered in lieu of degree. %3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EMinimum of ten (10) years related experience%26nbsp;in a security role, with a focus on managing classified environments.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EMust possess a current Top Secret/SCI security clearance.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EProven experience in designing and implementing ICD 705 Physical Security construction designs.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EDemonstrated expertise in TEMPEST requirements and procedures.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EStrong knowledge of federal security regulations, including NISPOM, ICDs, and DCIDs.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EExcellent project management skills with the ability to manage multiple tasks and projects simultaneously.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EStrong analytical and problem-solving skills with attention to detail.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EEffective communication and interpersonal skills, with the ability to collaborate with diverse teams.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EAbility to travel as required for site visits, inspections, and training.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EProvide support to other security disciplines and sites%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cstrong%3E%3Cspan style=%22text-decoration: underline;%22%3EDesired Qualifications:%3C/span%3E%3C/strong%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3ERelevant security certifications (e.g., Certified Information Systems Security Professional (CISSP), Industrial Security Professional (ISP) are highly desirable.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E *! SAIC accepts applications on an ongoing basis and there is no deadline.
SAIC® is a premier Fortune 500® mission integrator focused on advancing the power of technology and innovation to serve and protect our world. Our robust portfolio of offerings across the defense, space, civilian and intelligence markets includes secure high-end solutions in mission IT, enterprise IT, engineering services and professional services. We integrate emerging technology, rapidly and securely, into mission critical operations that modernize and enable critical national imperatives.
We are approximately 24,000 strong; driven by mission, united by purpose, and inspired by opportunities. SAIC is an Equal Opportunity Employer. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $7.5 billion. For more information, visit saic.com. For ongoing news, please visit our newsroom.
These cookies are necessary for the website to function and cannot be turned off in our systems. You can set your browser to block these cookies, but then some parts of the website might not work.
Security
User experience
Target group oriented cookies
These cookies are set through our website by our advertising partners. They may be used by these companies to profile your interests and show you relevant advertising elsewhere.
Google Analytics
Google Ads
We use cookies
🍪
Our website uses cookies and similar technologies to personalize content, optimize the user experience and to indvidualize and evaluate advertising. By clicking Okay or activating an option in the cookie settings, you agree to this.
The best remote jobs via email
Join 5'000+ people getting weekly alerts with remote jobs!