Information System Security Officer (ISSO)

ASECFallon, NV
15dOnsite

About The Position

As an Information System Security Officer, you will play a key role in supporting a high-visibility DoD program. In this role, you’ll help shape and enforce the information system security policies, standards, and methodologies that keep our mission-critical systems protected. Are you ready to make an impact? As the ISSO, you will provide mission-critical support by: Proposing, coordinating, implementing, and enforcing information system security policies, standards and methodologies. Conducting vulnerability assessments using automated benchmarks and tools such as Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs), and Security Content Automation Protocol (SCAP) Compliance Checker. Utilizing SolarWinds or Splunk to perform advanced system monitoring, security event analysis, and continuous compliance activities. Implementing operating systems and network devices security configuration in accordance with Defense Information Systems Agency (DISA) approved Security Technical Implementation Guides (STIGs). Performing security control continuous monitoring, reviewing system security plans and associated artifacts, security audits, risk analysis and developing mitigation strategies for DoD information systems. Identifying Common Criteria and National Information Assurance Partnership (NIAP) certified technologies and the DISA Approved Products List (APL). Preparing certification letters and Memoranda of Agreement (MoA) with system owners for interface and networking implementations. Providing guidance of cross-functional cybersecurity efforts ensuring alignment with organizational and program goals and milestones. Collaborating on documentation for Information System Authority to Operate (ATO) decisions, including SSPs, SOPs, POA&Ms, and Knowledge Articles. Conducting comprehensive risk assessments and vulnerability analyses to identify and mitigate potential threats to satellite communication infrastructures. Position may require flexibility in working hours. The job description is not intended to be an all-inclusive list of duties and responsibilities. It is intended to describe the general nature of the position.

Requirements

  • Education Requirements: Bachelor's in Computer Science, Information Systems Management, Engineering, or a related, technical area of study preferred. Without a bachelor's degree, 10 years of experience as an ISSO will be required.
  • At least 5 years of experience in the following areas is required:
  • Information Assurance/Cybersecurity (IA/CS)
  • Risk Management Framework (RMF)
  • DODI 8510.01
  • Security controls and implementation delineated in Committee of National Security Systems Instruction (CNSSI) 1253 and National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, and the Joint Special Access Program Implementation Guide (JSIG)
  • Performing vulnerability assessments using Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG), the Security Content Automation Protocol (SCAP) Compliance Checker, incorporating automated Benchmarks
  • Implementing operating systems and network devices security configuration in accordance with Defense Information Systems Agency (DISA) approved Security Technical Implementation Guides
  • Performing security control continuous monitoring, security audits, risk analysis and developing mitigation strategies for DoD information systems
  • Identifying Common Criteria and National Information Assurance Partnership (NIAP) certified technologies and the DISA Approved Products List (APL)
  • Knowledge of the Intelligence Community Directive (ICD) 705, DoD 5205.07, and DOD 5205.07-M Volumes 1-4, Special Access Program (SAP) Policy, and the Joint Special Access Program Implementation Guide (JSIG)
  • Certification Requirements: Candidates must hold a current IAM-II certification (i.e CompTIA CASP+ CE, CISM, CISSP) as defined by DoD 8570.01-M.
  • This position requires U.S. citizenship and must have an active Top Secret clearance with SCI eligibility . Selected candidate will be subject to a government security investigation and must meet eligibility requirements for access to classified information.

Nice To Haves

  • You are able to establish and maintain positive relationships with internal and external customers.
  • You possess professional and effective communication skills, both verbal and written.
  • You take a proactive approach to your work and you're able to accomplish tasks with limited guidance and supervision.
  • You have demonstrated critical thinking and problem solving skills.
  • Your organizational skills allow you to manage competing priorities.

Responsibilities

  • Proposing, coordinating, implementing, and enforcing information system security policies, standards and methodologies.
  • Conducting vulnerability assessments using automated benchmarks and tools such as Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs), and Security Content Automation Protocol (SCAP) Compliance Checker.
  • Utilizing SolarWinds or Splunk to perform advanced system monitoring, security event analysis, and continuous compliance activities.
  • Implementing operating systems and network devices security configuration in accordance with Defense Information Systems Agency (DISA) approved Security Technical Implementation Guides (STIGs).
  • Performing security control continuous monitoring, reviewing system security plans and associated artifacts, security audits, risk analysis and developing mitigation strategies for DoD information systems.
  • Identifying Common Criteria and National Information Assurance Partnership (NIAP) certified technologies and the DISA Approved Products List (APL).
  • Preparing certification letters and Memoranda of Agreement (MoA) with system owners for interface and networking implementations.
  • Providing guidance of cross-functional cybersecurity efforts ensuring alignment with organizational and program goals and milestones.
  • Collaborating on documentation for Information System Authority to Operate (ATO) decisions, including SSPs, SOPs, POA&Ms, and Knowledge Articles.
  • Conducting comprehensive risk assessments and vulnerability analyses to identify and mitigate potential threats to satellite communication infrastructures.

Benefits

  • ASEC offers meaningful work and a culture that supports your professional and personal growth.
  • 100% employee-owned.
  • Comprehensive benefits package (11 paid holidays, medical/dental/vision insurance, HSA/FSA, disability insurance, and more!)
  • 401K match
  • Tuition assistance (undergraduate and graduate)
  • Veteran friendly
  • Thriving employee culture
  • Employee discount program
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service