CYBER SECURITY SPECIALIST/ ISSO

Quantum Research International IncHuntsville, AL
27d

About The Position

Quantum Research is seeking an experienced Cybersecurity Specialist / Information System Security Officer (ISSO) to support the Compute Architecture Operations Center (CAOC) platform. The mid-level ISSO will be responsible for maintaining the system’s overall security posture IAW DoD RMF requirements. The ideal ISSO will maintain oversight of configuration management, security scanning and remediation activities, manage the Plan of Action and Milestones (POA&M), and provide cybersecurity guidance to infrastructure team members and on-site personnel to ensure compliance and risk reduction. Additionally, this role includes facilitating and participating in Configuration Control Board (CCB) meetings, evaluate proposed system and architecture changes to confirm security baselines are maintained through approved change management processes, and executing continuous monitoring activities such as reviewing system audits logs, general/privileged user account reviews, RMF documentation creation/maintenance, vulnerability response (CTOs/IAVAs), Information System Contingency Plan (ISCP) Table-Top exercises, and security control artifact development.

Requirements

  • Minimum of a Bachelor of Science (BS) degree in Computer Science, Information Systems or five (5) years of comparable work experience
  • ISSO with 2 years of verifiable experience
  • Knowledge and practical experience of DoD 8510 and NIST 800-53 Risk Management Framework implementation
  • Candidate must be compliant with DoD 8140; DoD Cyber Workforce Framework (DCWF) Code 722, Information System Security Manager, at the intermediate level. Requires CompTIA Security+ CE or other training and education requirements as identified in DoDM 8140.03
  • Fundamental knowledge of DISA Enterprise Mission Assurance Support Service (eMASS)
  • Security Clearance: Active Secret with the ability to obtain and maintain a Top Secret

Nice To Haves

  • Self-starter with the ability to independently identify, prioritize, and execute required tasks
  • Understanding of Multiple Independent Layers of Security (MILS) architecture
  • ISC2 CISSP Certification

Responsibilities

  • Develop and maintain ATO related documentation to include Configuration Management Plan (CMP), Account Management Plan (AMP), Information System Contingency Plan (ISCP), Incident Response Plan (IRP), Business Impact Analysis (BIA), Privacy Impact Analysis (PIA), System Security Plan (SSP), and Concept of Operations (CONOPS).
  • Identify the correct applicable Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs) for technologies used within the Information System (IS).
  • Communicate and coordinate with the government System Owner (SO) and/or government ISSM to ensure the system operates within the conditions of the established ATO.
  • Advise the program on IS security requirements, ensuring alignment with RMF, applicable NIST Guidelines/Standards, and DISA STIG/SRG compliance.
  • Provide security design guidance and analysis to project stakeholders across all RMF phases to ensure alignment with security control requirements.
  • Oversee daily system security operations by monitoring control effectiveness, validating access controls, reviewing security audit logs, tracking vulnerabilities, responding to CTOs/IAVAs within government customer's SharePoint site, and coordinating remediation efforts to maintain an acceptable security posture.
  • Act as the Configuration Management (CM) facilitator and voting CCB member, overseeing change control processes and participating in formal decision-making for system modifications affecting security posture and compliance.
  • Prepare Security Impact Assessments (SIAs) for all System Change Requests (SCRs) to support Configuration Control Board (CCB) review and decision-making.
  • Perform annual account reviews and approve all general and privileged user account requests prior to creation, ensuring proper authorization, access justification, and compliance IAW approved policies and procedures.
  • Review technical security assessments, analyze vulnerabilities, and risk data using ACAS, Nessus, and SCAP scan results to identify system vulnerabilities, non-compliance, and appropriate mitigation strategies.
  • Coordinate and manage security incident response activities in accordance with established policies and procedures.
  • Serve as the IS primary POC when communicating with the Security Control Assessor (SCA).
  • Create and maintain Plan of Action and Milestone (POA&M) items.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service