Cybersecurity Compliance Auditor / Security Control Assessor (SCA)
Johns Hopkins APL · Laurel, MD · Information Technology
About this role
Johns Hopkins APL is hiring a mid-level Security Analyst based in Laurel, MD. The posting calls out experience with TypeScript, ServiceNow, Security, Encryption.
- Role
- Security Analyst
- Function
- security
- Level
- mid
- Track
- Individual contributor
- Location
- Laurel, MD
- Department
- Information Technology
- Posted
- May 14, 2026
More roles at Johns Hopkins APL
Job description
from Johns Hopkins APL careersDo you enjoy assessing complex systems and ensuring they meet the highest cybersecurity standards in support of national security, space exploration, and advanced technologies?
If so, we are looking for someone like you to join our team at APL.
Recognized as one of Computerworld’s Top Places to Work in IT for seven consecutive years, APL is expanding its cybersecurity compliance and assessment capabilities.
We are seeking a Cybersecurity Compliance Auditor / Security Control Reviewer (SCR) to perform independent security control assessments across classified information systems to determine the overall effectiveness of the controls.
Our team is mission-driven—focused on securing systems that enable critical national security objectives. We operate in a collaborative, technically rigorous environment where your expertise directly impacts mission success.
As a Cybersecurity Compliance Auditor / Security Control Reviewer (SCR), you will:
- Planning, conducting, and performing independent security control assessments of classified systems in accordance with Risk Management Framework (RMF), Joint Special Access Program (SAP) Implementation Guide (JSIG), and applicable DoD/IC standards.
- Evaluate the implementation and effectiveness of security controls across a wide range of technologies and environments.
- Conduct risk-based assessments to determine system compliance and identify vulnerabilities, control gaps, and areas for process improvement.
- Analyze system documentation, test results, and artifacts to validate control implementation and authorization readiness.