Platzhalter Bild

Contract Program Security Officer at SAIC

SAIC · San Diego, United States Of America · Onsite

Apply Now
%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3ESAIC is seeking a highly qualified and experienced %3Cstrong%3EContract Program Security Officer (CPSO)%3C/strong%3E to oversee and manage the security operations for a Sensitive Compartmented Information Facility (SCIF) in San Diego, CA . The ideal candidate will have extensive experience in building ICD 705 Physical Security construction designs, as well as expertise in TEMPEST requirements and procedures.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cb%3E%3Cu%3E%3Cspan style=%22line-height: 107%;%22%3EResponsibilities:%3C/span%3E%3C/u%3E%3C/b%3E%3Cu%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/u%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3ESecurity Management:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul style=%22text-align: left;%22%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EOversee and enforce security policies, procedures, and protocols to ensure compliance with all relevant regulations and guidelines.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EManage and administer security clearances, briefings, and debriefings.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EConduct security audits, inspections, and investigations to identify and mitigate potential security risks.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3EICD 705 Physical Security:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul style=%22text-align: left;%22%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EDesign and implement physical security measures in accordance with ICD 705 standards to safeguard classified information.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EDevelop and review construction security plans (CSPs) and manage the accreditation process for SCIFs.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3ECollaborate with architects, engineers, and contractors to ensure security requirements are integrated into construction projects.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3ETEMPEST Compliance:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul style=%22text-align: left;%22%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EImplement and oversee TEMPEST measures to prevent compromising emanations from electronic equipment within the SCIF.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EConduct TEMPEST testing and assessments to ensure compliance with applicable standards and guidelines.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EProvide recommendations and solutions for TEMPEST vulnerabilities and coordinate corrective actions.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3ETraining and Education:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul style=%22text-align: left;%22%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EDevelop and conduct security awareness training for personnel with access to classified information.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EStay current with emerging security threats, technologies, and best practices to enhance security posture.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3EIncident Response:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli class=%22MsoNormal%22 style=%22text-align: left; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3ERespond to security incidents, conduct investigations, and implement corrective actions to prevent recurrence.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22text-align: left; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3ECoordinate with internal and external stakeholders, including law enforcement and intelligence agencies, as necessary.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E
%3Cp class=%22MsoNormal%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cb%3E%3Cu%3E%3Cspan style=%22line-height: 107%;%22%3ERequired Education and Qualifications:%3C/span%3E%3C/u%3E%3C/b%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cu%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/u%3E%3C!-- [if !supportLists]--%3E%3Cspan style=%22line-height: 107%;%22%3EBachelor%26rsquo;s degree in Security Management, Information Security, or a related field. Four (4) years of additional experience considered in lieu of degree. %3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EMinimum of ten (10) years related experience%26nbsp;in a security role, with a focus on managing classified environments.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EMust possess a current Top Secret/SCI security clearance.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EProven experience in designing and implementing ICD 705 Physical Security construction designs.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EDemonstrated expertise in TEMPEST requirements and procedures.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EStrong knowledge of federal security regulations, including NISPOM, ICDs, and DCIDs.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EExcellent project management skills with the ability to manage multiple tasks and projects simultaneously.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EStrong analytical and problem-solving skills with attention to detail.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EEffective communication and interpersonal skills, with the ability to collaborate with diverse teams.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EAbility to travel as required for site visits, inspections, and training.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EProvide support to other security disciplines and sites%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cstrong%3E%3Cspan style=%22text-decoration: underline;%22%3EDesired Qualifications:%3C/span%3E%3C/strong%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3ERelevant security certifications (e.g., Certified Information Systems Security Professional (CISSP), Industrial Security Professional (ISP) are highly desirable.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E
*! SAIC accepts applications on an ongoing basis and there is no deadline.

SAIC® is a premier Fortune 500® mission integrator focused on advancing the power of technology and innovation to serve and protect our world. Our robust portfolio of offerings across the defense, space, civilian and intelligence markets includes secure high-end solutions in mission IT, enterprise IT, engineering services and professional services. We integrate emerging technology, rapidly and securely, into mission critical operations that modernize and enable critical national imperatives.

We are approximately 24,000 strong; driven by mission, united by purpose, and inspired by opportunities. SAIC is an Equal Opportunity Employer. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $7.5 billion. For more information, visit saic.com. For ongoing news, please visit our newsroom.
Apply Now

Other home office and work from home jobs