Information System Security Officer (ISSO)

ASECFallon Station, NV
2dOnsite

About The Position

As an Information System Security Officer, you will play a key role in supporting a high-visibility DoD program. In this role, you’ll help shape and enforce the information system security policies, standards, and methodologies that keep our mission-critical systems protected. Are you ready to make an impact? As the ISSO, you will provide mission-critical support by: Proposing, coordinating, implementing, and enforcing information system security policies, standards and methodologies. Conducting vulnerability assessments using automated benchmarks and tools such as Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs), and Security Content Automation Protocol (SCAP) Compliance Checker. Utilizing SolarWinds or Splunk to perform advanced system monitoring, security event analysis, and continuous compliance activities. Implementing operating systems and network devices security configuration in accordance with Defense Information Systems Agency (DISA) approved Security Technical Implementation Guides (STIGs). Performing security control continuous monitoring, reviewing system security plans and associated artifacts, security audits, risk analysis and developing mitigation strategies for DoD information systems. Identifying Common Criteria and National Information Assurance Partnership (NIAP) certified technologies and the DISA Approved Products List (APL). Preparing certification letters and Memoranda of Agreement (MoA) with system owners for interface and networking implementations. Providing guidance of cross-functional cybersecurity efforts ensuring alignment with organizational and program goals and milestones. Collaborating on documentation for Information System Authority to Operate (ATO) decisions, including SSPs, SOPs, POA&Ms, and Knowledge Articles. Conducting comprehensive risk assessments and vulnerability analyses to identify and mitigate potential threats to satellite communication infrastructures. Position may require flexibility in working hours. This description outlines the general nature and scope of the role. Additional duties may be assigned as necessary.

Requirements

  • Bachelor's in Computer Science, Information Systems Management, Engineering, or a related, technical area of study preferred. Without a bachelor's degree, 10 years of experience as an ISSO will be required.
  • Candidates must hold a current IAM-II certification (i.e CompTIA CASP+ CE, CISM, CISSP) as defined by DoD 8570.01-M. Please upload copies of any relevant IT certifications as part of your application. These documents help us verify qualifications during the initial screening process.
  • At least 5 years of experience in the following areas is required:
  • Information Assurance/Cybersecurity (IA/CS)
  • Risk Management Framework (RMF) DODI 8510.01
  • Security controls and implementation delineated in Committee of National Security Systems Instruction (CNSSI) 1253 and National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, and the Joint Special Access Program Implementation Guide (JSIG)
  • Performing vulnerability assessments using Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG), the Security Content Automation Protocol (SCAP) Compliance Checker, incorporating automated Benchmarks
  • Implementing operating systems and network devices security configuration in accordance with Defense Information Systems Agency (DISA) approved Security Technical Implementation Guides
  • Performing security control continuous monitoring, security audits, risk analysis and developing mitigation strategies for DoD information systems
  • Identifying Common Criteria and National Information Assurance Partnership (NIAP) certified technologies and the DISA Approved Products List (APL)
  • Knowledge of the Intelligence Community Directive (ICD) 705, DoD 5205.07, and DOD 5205.07-M Volumes 1-4, Special Access Program (SAP) Policy, and the Joint Special Access Program Implementation Guide (JSIG)
  • This position requires U.S. citizenship and an active DoD Top Secret clearance with SCI eligibility. Selected candidate will be subject to a government security investigation and must meet eligibility requirements for access to classified information.

Nice To Haves

  • Ability to build positive, collaborative relationships across teams and with external partners.
  • Effective communicator with strong verbal and written skills.
  • Proactive, self-directed work style with the ability to operate independently.
  • Analytical thinker with proven problem-solving capabilities.
  • Highly organized, with the ability to balance competing priorities in a fast-paced environment.

Responsibilities

  • Proposing, coordinating, implementing, and enforcing information system security policies, standards and methodologies.
  • Conducting vulnerability assessments using automated benchmarks and tools such as Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs), and Security Content Automation Protocol (SCAP) Compliance Checker.
  • Utilizing SolarWinds or Splunk to perform advanced system monitoring, security event analysis, and continuous compliance activities.
  • Implementing operating systems and network devices security configuration in accordance with Defense Information Systems Agency (DISA) approved Security Technical Implementation Guides (STIGs).
  • Performing security control continuous monitoring, reviewing system security plans and associated artifacts, security audits, risk analysis and developing mitigation strategies for DoD information systems.
  • Identifying Common Criteria and National Information Assurance Partnership (NIAP) certified technologies and the DISA Approved Products List (APL).
  • Preparing certification letters and Memoranda of Agreement (MoA) with system owners for interface and networking implementations.
  • Providing guidance of cross-functional cybersecurity efforts ensuring alignment with organizational and program goals and milestones.
  • Collaborating on documentation for Information System Authority to Operate (ATO) decisions, including SSPs, SOPs, POA&Ms, and Knowledge Articles.
  • Conducting comprehensive risk assessments and vulnerability analyses to identify and mitigate potential threats to satellite communication infrastructures.

Benefits

  • 100% employee-owned company. Learn more about our Employee Stock Ownership Plan (ESOP) here!
  • Comprehensive benefits package, including 11 paid holidays, medical/dental/vision coverage, HSA/FSA options, disability insurance, and more!
  • 401(k) with company match
  • Tuition assistance for undergraduate and graduate education
  • Veteran-friendly employer
  • Thriving employee culture
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service