Student Veterans of America Jobs

Welcome to SVA’s jobs portal, your one-stop shop for finding the most up to date source of employment opportunities. We have partnered with the National Labor Exchange to provide you this information. You may be looking for part-time employment to supplement your income while you are in school. You might be looking for an internship to add experience to your resume. And you may be completing your training ready to start a new career. This site has all of those types of jobs.

Here are a few things you should know:
  • This site is mobile friendly. You do not need a log-in or password to access information.
  • Jobs on this site are original and unduplicated and come from three sources: the Federal government, state workforce agency job banks, and corporate career websites. All jobs are vetted to ensure there are no scams, training schemes, or phishing.
  • The site is refreshed daily to remove out-of-date content.
  • The newest jobs are listed first, so use the search features to match your interests. You can look for jobs in a specific geographical location, by title or keyword, or you can use the military crosswalk. You may want to do something different from your military career, but you undoubtedly have skills from that occupation that match to a civilian job.

Job Information

Booz Allen Hamilton INC. Information Security Risk Specialist in East Port Orchard, Washington

Job Number: R0193522 Information Security Risk Specialist The Opportunity: Cyber threats are everywhere and the constantly evolving nature of these threats can make understanding them seem overwhelming to the client's military organizations. In all of this "cyber noise", how can these organizations understand their risks and how to mitigate them? The answer is you - build your knowledge as an information security risk specialist who knows how to break down complex threats into manageable plans of action. As an information security risk specialist on our team, you'll use your experience to work with a naval shipyard to discover their cyber risks, understand policies, and develop a mitigation plan. You'll review technical, environmental, and personnel details from SMEs, engineers, system owners, and stakeholders to assess the entire threat landscape. Then, you'll guide your client through a plan of action with presentations, whitepapers, and milestones. You'll work with your client to translate security concepts, so they can make the best decisions to secure their mission-critical systems and critical infrastructure. This is your opportunity to act as an information security subject matter expert while broadening your skills in cybersecurity analysis and mitigation solutions. Join us as we protect communications systems and network infrastructure in support of an organization critical to our nation's defense. Join us. The world can't wait. You Have: Experience with DoD Risk Management Framework(RMF), cloud computing technologies, andpolicies, procedures, and standard operating procedures Experience with Windows and Linux environments Knowledge of Department of Defense (DoD) STIGs or SRGs and Navy cybersecurity policies and requirements Ability to analyze system details and identify security requirements for emerging systems Ability to work independently to develop RMF A&A documentation and artifacts to obtain RMF Authority to Operate Secret clearance DoD IAT Level I or II and IAM Level I or II Certification CompTIA Security +, CASP, CISSP, eMASS, ACAS or Navy Qualified Validator certification Nice If You Have: Experience with eMASS to populate required artifacts to support an authorization decision Experience with Enterprise Mission Assurance Support Service(eMASS), Security Technical Implementation Guides(STIGs), Security Content Automation Protocol(SCAP), Assured Compliance Assessment Solution(ACAS), Ports, Protocols, and Services Matrix, Vulnerability Remediation Asset Manager(VRAM), and Host-Based Security System Knowledge of continuous monitoring, cyber security risk management,disaster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments Ability to create tactics, techniques, whitepapers, workflows, system data flows, and architectural diagrams CISSP or CISM Certification Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Secret clearance is required. Create Your Career: Grow With Us Your growth matters to us-that's why we offer a variety of ways for you to develop your career. With professional and leadership development opportunities like , tuition reimbursement, mentoring, and firm-sponsored networking, you can chart a unique and fulfilling career path on your own terms. A Place Where You Belong Diverse perspectives cultivate collective ingenuity. means that, here, you are free to bring your whole self to work. With an array of business resource groups and other opportunities for connection, you'll build your community in no time. Support Your Well-Being Our

DirectEmployers