About The Position

RiVidium Inc. is seeking a Journeyman Information Systems Security Officer (ISSO) to support cybersecurity operations, compliance, and risk management activities for Department of Defense Information Systems and Platform IT systems. The ISSO will assist the Information Systems Security Manager (ISSM) in executing system security responsibilities and ensuring adherence to DoD cybersecurity policies, procedures, and reporting requirements. This role requires strong analytical skills, deep knowledge of cybersecurity best practices, and experience supporting the full system lifecycle in complex environments.

Requirements

  • Education: Bachelor's degree in Information Technology, Cybersecurity, Computer Science, Information Systems, Data Science, or Software Engineering.
  • Substitution: Four additional years of relevant technical experience may substitute for a bachelor's degree.
  • Certifications (One or more required): SecurityX / CASP+, CCISO, CCSP, CGRC (CAP), Cloud+, GSEC, Security+, SSCP.
  • Experience: Five years of experience executing lifecycle Information Assurance/Cybersecurity activities.
  • Five years of progressively complex experience developing, integrating, and implementing cybersecurity and program protection standards across networks, systems, and custom applications.
  • Clearance: Active Top Secret/SCI with CI poly required.

Nice To Haves

  • Preferred Higher-Level Certifications (IA Technical Level 3): CASP+ CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, CCSP.

Responsibilities

  • Assist the ISSM in meeting all duties and responsibilities for assigned Information Systems (IS) and Platform IT (PIT) systems.
  • Implement and enforce DoD cybersecurity policies, procedures, and requirements across the system lifecycle.
  • Ensure all system users have proper security clearances, access authorizations, and cybersecurity training prior to system access.
  • Coordinate with the ISSM to initiate corrective or protective actions when cybersecurity incidents or vulnerabilities are identified.
  • Ensure processes are in place for users to report cybersecurity events, threats, and vulnerabilities.
  • Maintain accurate, up-to-date, and accessible cybersecurity documentation for all assigned systems.
  • Review reports from static code analysis, penetration testing, and vulnerability scanning.
  • Review network diagrams, data flow diagrams, organizational charts, and other artifacts to identify risks or vulnerabilities related to processes, systems, or personnel.
  • Support compliance, reporting, authorization, and continuous monitoring activities as required.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service