Leidos-posted 3 days ago
Full-time • Mid Level
Ashburn, VA
11-50 employees

Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations.  The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations. Primary Responsibilities: The contractor shall provide a qualified individual(s) to serve as an Information Systems Security Officer (ISSO) providing cyber security oversight for several major CBP applications and general support systems as assigned by the Government Information Systems Security Manager. The contractor ISSO must be an acknowledged expert concerning current Federal, National, DHS and CBP standards, policies, requirements and procedures and shall provide technical security expertise in planning, coordinating, preparing and authoring security authorization documentation necessary to ensure OPR meets all Federal Information Systems Modernization Act (FISMA) regulatory requirements and DHS 4300-A Sensitive Systems Policy and CBP 1400-05D Information Security Policy. The ISSO will manage the overall security related policies, procedures, laws and regulations; create, document and implement various security plans and compliance documents to enforce Information Assurance principles. In attaining this goal, the contractor shall support the Government Information Systems Security Manager by performing the following duties:

  • Develop, draft, review and endorse all information systems security plans and other security authorization artifacts and documents such as: Standards for Security Categorization of Federal Information and Information Systems (FIPS 199) Assessmen E-Authentication Determination Privacy Threshold Analysis (PTA) Privacy Impact Assessment (PIA) Risk Assessment Plan System Security Plan (SSP) Configuration Management Plan Contingency Plan Contingency Plan Test and Test Results Section 508 of the Rehabilitation Act Plan Plan of Action & Milestones (POA&Ms) Policy waiver and Risk Acceptance request
  • Ensure that assigned systems are operated, maintained, and disposed of in accordance with applicable policies and procedures NIST SP 800-37, Rev 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, DHS 4300A Policy and Handbook, CBP Information Systems Security Policies and Procedures Handbook (HB 1400-05D), and internal CBP (i.e., Office of Information Technology, Security Operations Division, etc.) security policies and practices
  • Develop, review, maintain, and provide system security documentation for assigned systems, including System Security Plans, Interconnection Security Agreements, Contingency Plans, Plans of Action and Milestones, (POA&M), Waivers, and Exceptions through the DHS FISMA system management tool in use to implement and manage the NIST Risk Management Framework.
  • Complete all activities required by the DHS Ongoing Authorization (OA) Program to transition assigned systems into the DHS OA Program and perform all required actions to maintain system authorization under OA once the system is admitted to the Program
  • Assist the Government with the reporting and management of system level security violations and incidents.
  • Assist the Government with the technical security evaluation of threats and vulnerabilities involving new/enhanced technology.
  • Assi st the Government with providing oversight to vulnerability scanning processes and procedures.
  • Assist the Government with providing oversight to security patch management/flaw remediation processes and procedures.
  • Assist with development of cyber security SOPs, playbooks, work instructions, and other procedures and processes to mature cyber security capabilities.
  • A minimum of a Bachelor’s degree coupled with 8 years’ experience in the Information Technology arena or Master's Degree with 6 years of relevant experience.
  • Minimum of 5 years of experience as an ISSO supporting major federal information systems/applications
  • Bachelor Degree in Computer Science , IT, Information/Cyber Security field from an accredited college or university
  • Knowledge with auditing security controls and financial processes
  • Superior writing, communication and critical analysis skills
  • Deep understanding of Information Assurance, Information Technology and Information Management concepts, processes and procedures
  • Working knowledge of the following policies: NIST SP 800-37, Rev 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, DHS 4300A Policy and Handbook, CBP Information Systems Security Policies and Procedures Handbook (HB 1400-05D),
  • ISC2 Certified in Governance, Risk and Compliance Certification (CGRC)
  • ISC2 Certified Information Systems Security Professional (CISSP)
  • ISACA Certified Information Security Manager (CISM)
  • CompTIA Certified Advanced Security Practitioner (CASP+)
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service