Information System Security Officer

Booz Allen HamiltonAberdeen Proving Ground, MD
1d

About The Position

Information System Security Officer The Opportunity: Participate in the development or modification of the computer environment security program plans and requirements; supervise or manage protective or corrective measures when a Cybersecurity incident or vulnerability is discovered. Ensure that Cybersecurity requirements are integrated into the Continuity of Operations Plan (COOP) for that system or DoD Component. Ensure that Cybersecurity requirements are appropriately identified in computer environment operation procedures. Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network systems operations. Develop security requirements specific to an IT acquisition to be included in procurement documents. Develop security requirements for hardware, software, and services acquisitions specific to Cybersecurity programs. Ensure that Information Assurance (IA) and IA enabled software, hardware, and firmware comply with appropriate security configuration guidelines, policies, and procedures. Review Cybersecurity plans and identify alternative functional Cybersecurity strategies to address organizational security concerns. Ensure that Cybersecurity inspections, tests, and reviews are coordinated. Evaluate the presence and adequacy of security measures proposed or provided in response to requirements contained in acquisition documents. Advise the Authorizing Official of any changes affecting the enclave's security posture. Join us. The world can't wait.

Requirements

  • 6+ years of experience working in cybersecurity
  • Experience with authorization actions concerning software development and testing
  • Experience with the interpretation of patterns of non-compliance to determine their impact on levels of risk or overall effectiveness of the enclave’s cybersecurity program
  • Experience with evaluating risk analysis in the decision-making process
  • Experience with evaluating proposals to determine if proposed security solutions effectively address enclave requirements, as detailed in solicitation documents
  • Experience with reviewing cybersecurity policies
  • Secret clearance
  • Bachelor’s degree
  • CompTIA Security+ Certification

Nice To Haves

  • Experience with using Enterprise Mission Assurance Support Service (eMASS)
  • Knowledge of the configuration management (CM) of DoD software, including source code, documentation, and fieldable products
  • Knowledge of DoD security and program protection and declassification operations
  • Knowledge of DoD 8500, AR 25-2, AR 70-1, and DA PAM 70-3 Army Acquisition Implementation
  • ISC2 Certified Information Systems Security Professional (CISSP) Certification
  • Microsoft IT Professional (MCITP), Microsoft Certified Systems Engineer (MCSE), Microsoft Certified Professional (MCP) on Windows 2016 or 2019 Server, Windows 10 MCSE, or Operating Systems Certifications
  • Linux Certifications
  • Cisco Networking Certifications

Responsibilities

  • Participate in the development or modification of the computer environment security program plans and requirements
  • Supervise or manage protective or corrective measures when a Cybersecurity incident or vulnerability is discovered
  • Ensure that Cybersecurity requirements are integrated into the Continuity of Operations Plan (COOP) for that system or DoD Component
  • Ensure that Cybersecurity requirements are appropriately identified in computer environment operation procedures
  • Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network systems operations
  • Develop security requirements specific to an IT acquisition to be included in procurement documents
  • Develop security requirements for hardware, software, and services acquisitions specific to Cybersecurity programs
  • Ensure that Information Assurance (IA) and IA enabled software, hardware, and firmware comply with appropriate security configuration guidelines, policies, and procedures
  • Review Cybersecurity plans and identify alternative functional Cybersecurity strategies to address organizational security concerns
  • Ensure that Cybersecurity inspections, tests, and reviews are coordinated
  • Evaluate the presence and adequacy of security measures proposed or provided in response to requirements contained in acquisition documents
  • Advise the Authorizing Official of any changes affecting the enclave's security posture

Benefits

  • Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care.
  • Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values.
  • Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen’s benefit programs.
  • Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service