%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3ESAIC is seeking a highly qualified and experienced %3Cstrong%3EContract Program Security Officer (CPSO)%3C/strong%3E to oversee and manage the security operations for a Sensitive Compartmented Information Facility (SCIF) in San Diego, CA . The ideal candidate will have extensive experience in building ICD 705 Physical Security construction designs, as well as expertise in TEMPEST requirements and procedures.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cb%3E%3Cu%3E%3Cspan style=%22line-height: 107%;%22%3EResponsibilities:%3C/span%3E%3C/u%3E%3C/b%3E%3Cu%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/u%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3ESecurity Management:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul style=%22text-align: left;%22%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EOversee and enforce security policies, procedures, and protocols to ensure compliance with all relevant regulations and guidelines.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EManage and administer security clearances, briefings, and debriefings.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EConduct security audits, inspections, and investigations to identify and mitigate potential security risks.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3EICD 705 Physical Security:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul style=%22text-align: left;%22%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EDesign and implement physical security measures in accordance with ICD 705 standards to safeguard classified information.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EDevelop and review construction security plans (CSPs) and manage the accreditation process for SCIFs.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3ECollaborate with architects, engineers, and contractors to ensure security requirements are integrated into construction projects.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3ETEMPEST Compliance:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul style=%22text-align: left;%22%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EImplement and oversee TEMPEST measures to prevent compromising emanations from electronic equipment within the SCIF.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EConduct TEMPEST testing and assessments to ensure compliance with applicable standards and guidelines.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EProvide recommendations and solutions for TEMPEST vulnerabilities and coordinate corrective actions.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3ETraining and Education:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul style=%22text-align: left;%22%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3EDevelop and conduct security awareness training for personnel with access to classified information.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EStay current with emerging security threats, technologies, and best practices to enhance security posture.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp class=%22MsoNormal%22 style=%22margin-bottom: 0in; text-align: left;%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22text-decoration: underline;%22%3E%3Cb%3E%3Cspan style=%22line-height: 107%;%22%3EIncident Response:%3C/span%3E%3C/b%3E%3C/span%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli class=%22MsoNormal%22 style=%22text-align: left; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cspan style=%22line-height: 107%;%22%3ERespond to security incidents, conduct investigations, and implement corrective actions to prevent recurrence.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22text-align: left; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3ECoordinate with internal and external stakeholders, including law enforcement and intelligence agencies, as necessary.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E %3Cp class=%22MsoNormal%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cb%3E%3Cu%3E%3Cspan style=%22line-height: 107%;%22%3ERequired Education and Qualifications:%3C/span%3E%3C/u%3E%3C/b%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cu%3E%3Cspan style=%22line-height: 107%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/u%3E%3C!-- [if !supportLists]--%3E%3Cspan style=%22line-height: 107%;%22%3EBachelor%26rsquo;s degree in Security Management, Information Security, or a related field. Four (4) years of additional experience considered in lieu of degree. %3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EMinimum of ten (10) years related experience%26nbsp;in a security role, with a focus on managing classified environments.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EMust possess a current Top Secret/SCI security clearance.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EProven experience in designing and implementing ICD 705 Physical Security construction designs.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EDemonstrated expertise in TEMPEST requirements and procedures.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EStrong knowledge of federal security regulations, including NISPOM, ICDs, and DCIDs.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EExcellent project management skills with the ability to manage multiple tasks and projects simultaneously.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EStrong analytical and problem-solving skills with attention to detail.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EEffective communication and interpersonal skills, with the ability to collaborate with diverse teams.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EAbility to travel as required for site visits, inspections, and training.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3Cli class=%22MsoNormal%22 style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3EProvide support to other security disciplines and sites%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3Cp style=%22font-family: Arial; color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3E%3Cstrong%3E%3Cspan style=%22text-decoration: underline;%22%3EDesired Qualifications:%3C/span%3E%3C/strong%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3Cul%3E%0A%3Cli style=%22color: rgb(0, 0, 0);%22%3E%3Cspan style=%22color: #000000;%22%3E%3Cspan style=%22font-size: 18px;%22%3E%3Cspan style=%22font-family: arial, helvetica, sans-serif;%22%3ERelevant security certifications (e.g., Certified Information Systems Security Professional (CISSP), Industrial Security Professional (ISP) are highly desirable.%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E *! SAIC accepts applications on an ongoing basis and there is no deadline.
SAIC® is a premier Fortune 500® mission integrator focused on advancing the power of technology and innovation to serve and protect our world. Our robust portfolio of offerings across the defense, space, civilian and intelligence markets includes secure high-end solutions in mission IT, enterprise IT, engineering services and professional services. We integrate emerging technology, rapidly and securely, into mission critical operations that modernize and enable critical national imperatives.
We are approximately 24,000 strong; driven by mission, united by purpose, and inspired by opportunities. SAIC is an Equal Opportunity Employer. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $7.5 billion. For more information, visit saic.com. For ongoing news, please visit our newsroom.
Estas cookies son necesarias para que el sitio web funcione y no se pueden desactivar en nuestros sistemas. Puede configurar su navegador para bloquear estas cookies, pero entonces algunas partes del sitio web podrían no funcionar.
Seguridad
Experiencia de usuario
Cookies orientadas al público objetivo
Estas cookies son instaladas a través de nuestro sitio web por nuestros socios publicitarios. Estas empresas pueden utilizarlas para elaborar un perfil de sus intereses y mostrarle publicidad relevante en otros lugares.
Google Analytics
Anuncios Google
Utilizamos cookies
🍪
Nuestro sitio web utiliza cookies y tecnologías similares para personalizar el contenido, optimizar la experiencia del usuario e indvidualizar y evaluar la publicidad. Al hacer clic en Aceptar o activar una opción en la configuración de cookies, usted acepta esto.
Los mejores empleos remotos por correo electrónico
¡Únete a más de 5.000 personas que reciben alertas semanales con empleos remotos!