Torch Technologies is seeking an Information System Security Officer, Senior to join the team at Hill AFB, UT. Torch Technologies is a 100% employee-owned business dedicated to providing superior research, development, and engineering services to the Department of Defense. As defense contractors, the services we provide directly support the warfighter. As an Information System Security Officer, Senior your duties will include the following, but are not limited to: · Ensure the appropriate operational security posture is maintained for the assigned IT. · Ensure that all system and application deliverables meet the requirements of all DoD and Air Force Cybersecurity policies as identified in DoDI 8510.01 (29 Dec 2020), AFI 17-101 (6 Feb 2020), AFI 17-130 (13 Feb 2020), AFMAN 17-1303 (12 May 2020), Para 2.20, Attachment 2 IAT Level II as determined by the Unit Information System Security Manager (ISSM). · Perform work that involves ensuring the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, artifact creation development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools. · Support the system/application authorization and accreditation (A&A) effort, to include assessing and guiding the quality and completeness of A&A activities, tasks, and resulting artifacts mandated by governing DoD and Air Force policies (i.e., RMF). · Provide support for the configuration and artifact creation for IS and or Platform Information Technology (PIT) systems in accordance with applicable guidance for RMF accreditation. · Recommend or assist in the creation of policies and procedures to ensure the reliability of and accessibility to information systems and to prevent and defend against unauthorized access to systems, networks, and data. · Assist the Information System Security Manager (ISSM) with conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs. · Conduct systems security evaluations, audits, and reviews. · Work with the ISSM to create individual systems security contingency plans and disaster recovery procedures. · Create and implement programs to ensure that individual IS or PIT systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures created by the ISSM. · Participate in network and systems design to ensure implementation of appropriate systems security policies to include artifact creation for RMF activity. · Facilitate in the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes and or investigations related to failure to follow security policy. · Ensure the rigorous application of information security/cybersecurity policies, principles, and practices in the delivery of all IT services.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
251-500 employees