There are still lots of open positions. Let's find the one that's right for you.
This position will support classified computing environments 100% onsite at our facilities in Cedar Rapids, Iowa, specifically supporting the Mission Systems C4I&AS Portfolio. The Information System Security Officer (ISSO) is responsible for implementing and enforcing cybersecurity compliance directives with hands-on execution and oversight. The role involves creating, sustaining, and enforcing standard operating procedures developed from government compliance documents and regulations such as NISPOM, DFARS, DAAPM, and JSIG. The ISSO must be adept at interpreting and troubleshooting requests and tasks of varying complexity, utilizing a wide variety of cybersecurity technologies and tools, and requires a comprehensive selection of Information Technology skill sets. In this role, you will be responsible for designated information system compliance at the system level, which includes technical configuration analysis, change control facilitation, hardware/software management, audits and inspections, incident response, and troubleshooting. You will maintain the System Security Plan and manage change control per established procedures. Ensuring that all users have the requisite security clearances, authorization, and need-to-know is critical, as is providing security training and guidance. You will collect, review, document, and archive security event logs, reports, and files in accordance with the System Security Plan, reporting any anomalies as they arise. Monitoring and analyzing all available resources that track user activity, providing warnings of system vulnerabilities, and delivering system performance information in accordance with cybersecurity plans and policies will be part of your daily responsibilities. Additionally, you will manage the tracking, accounting, safeguarding, and disposition of material assets associated with secure systems. It is essential to possess and maintain technical competence and a working knowledge of system functions, security policies, technical security safeguards, and operational security measures. You will also need to understand the implications of your work and make recommendations for solutions.