Information Systems Security Officer 3

ItezzAnnapolis Junction, MD

About The Position

This position provides support for a program, organization, system, or enclave’s information assurance program. It involves proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. The role maintains the operational security posture for information systems to ensure security policies and procedures are followed, and assists with managing security aspects and day-to-day security operations. Responsibilities include evaluating security solutions for classified information, performing vulnerability/risk assessment analysis for certification and accreditation, and providing configuration management for security software, hardware, and firmware. The officer will manage system changes, assess their security impact, and prepare documentation such as System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). The role also supports security authorization activities in compliance with the National Institute of Standards and Technology Risk Management Framework (NIST RMF). United States Citizenship and an appropriate security clearance (e.g., Active TS/SCI with customer appropriate polygraph) are required due to federal contract requirements.

Requirements

  • TS/SCI with Agency Appropriate Polygraph
  • Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required (Five (5) years of additional experience as an ISSO may be substituted for a bachelor’s degree)
  • DoD 8570 compliance with Information Assurance Management (IAM) Level I is required
  • Fifteen (15) years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required
  • Three (3) of those years must include experience in at least three (3) of the following: knowledge of current security tools hardware/software security implementation communication protocols encryption techniques/tools

Responsibilities

  • Provide support for a program, organization, system, or enclave’s information assurance program
  • Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies
  • Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed
  • Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
  • Evaluate security solutions to ensure they meet security requirements for processing classified information
  • Perform vulnerability/risk assessment analysis to support certification and accreditation
  • Provide configuration management (CM) for information system security software, hardware, and firmware
  • Manage changes to system and assesses the security impact of those changes
  • Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs)
  • Support security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF)
  • Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
  • Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
  • Develop system security policy and ensures compliance
  • Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave
  • Develop and update the system security plan and other Cybersecurity documentation
  • Administer the user identification and authentication mechanism of the Information System (IS)
  • Prepare and maintain documentation
  • Perform CM of information system security software, hardware, and firmware
  • Propose, coordinate, and implement, information systems security policies, standards, and methodologies and ensure they are followed
  • Obtain C&A for ISs under their purview
  • Plan and coordinate the IT security programs and policies
  • Manage and control changes to the system and assessing the security impact of those changes
  • Provide daily oversight and direction to contractor ISSOs
  • Serve as an ISSM
  • Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives

Benefits

  • The company automatically contributes an additional 10% of each employee's gross compensation to the company SEP IRA plan, with no requirement for employee matching
  • All contributions are fully vested from day one, ensuring immediate ownership of retirement funds
  • Full-time employees have the option to participate in a variety of voluntary benefit plans including: A Choice of CareFirst BlueChoice Medical Plans, some with Health Savings Account (HSA)
  • CareFirst Preferred Dental
  • CareFirst BlueVision
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service