About The Position

Support and maintain an organization’s information assurance program, including the development, coordination, implementation, and enforcement of security policies, standards, and methodologies. Maintain the operational security posture of information systems by managing day-to-day security operations and ensuring compliance with established security procedures. Evaluate and implement security solutions to meet requirements for processing classified information, including conducting vulnerability and risk assessments for certification and accreditation. Manage configuration control for system security software, hardware, and firmware, assessing and documenting the security impact of system changes. Prepare, review, and support security documentation and authorization activities, including SSPs, Risk Assessments, C&A packages, SRTMs, and compliance with the NIST RMF. Heavy emphasis on secure Wi-Fi not on cellular technology

Requirements

  • Fifteen (15) years of experience as an ISSO on programs or contracts of similar scope, type, and complexity.
  • At least three (3) years of experience in three or more of the following areas: current security tools, hardware/software security implementation, communication protocols, and encryption techniques/tools.
  • Bachelor’s degree in Computer Science or a related field from an accredited institution, or five (5) additional years of ISSO experience in lieu of a degree.
  • DoD 8570 compliance with Information Assurance Management (IAM) Level I certification.
  • Experience with security policies in mobile environments (infrastructure and end user) if assigned to DES Mobility Services tasks.

Responsibilities

  • Support senior ISSOs and the ISSM in implementing, enforcing, and maintaining information systems security policies, standards, and methodologies.
  • Develop, update, and maintain system security policies, System Security Plans (SSPs), and other cybersecurity documentation to ensure compliance.
  • Provide and manage configuration management (CM) for security-relevant software, hardware, and firmware, including control of system changes and security impact assessments.
  • Maintain accurate records and inventories for workstations, servers, network devices, and system upgrades.
  • Evaluate and validate security solutions to ensure compliance with requirements for processing classified information.
  • Maintain the operational cybersecurity posture of systems, programs, or enclaves through continuous monitoring and day-to-day security operations.
  • Assist with and obtain Certification and Accreditation (C&A) for information systems, including development and maintenance of C&A documentation in accordance with ODNI and DoD policies.
  • Administer user identification, authentication mechanisms, and access controls for information systems.
  • Plan, coordinate, and support information assurance and IT security programs across programs, organizations, systems, or enclaves.
  • Provide oversight and direction to contractor ISSOs and serve as an ISSM when required.

Benefits

  • healthcare
  • wellness
  • financial
  • retirement
  • family support
  • continuing education
  • time off benefits

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service