Information Systems Security Officer (ISSO) - SME

PeratonSpring Lake, NC
12d$104,000 - $166,000Onsite

About The Position

Join Peraton's mission-critical team supporting secure, real-time data delivery across complex operational environments in direct support of our nation's warfighters. If you are driven by national security and energized by cutting-edge C2ISR capabilities, sensor integration, and resilient data transport solutions, we invite you to join our team. We are seeking highly cleared professionals who excel at the intersection of advanced communications infrastructure, distributed systems, and mission assurance where reliability, security, and performance are paramount. Specifically, we are looking for a TS/SCI cleared Information Systems Security Officer (ISSO) - SME to support this mission at Pope Army Airfield, North Carolina. Responsibilities: As an Information Systems Security Officer (ISSO) - SME you will provide technical and management leadership for all equipment and information support functions across the Task Order. Your responsibilities include:

Requirements

  • Previous experience as an Information Systems Security Officer (ISSO) or similar role supporting a DoD customer at the CCMD level
  • Minimum of 12 years’ experience with a BA/BS or 10 years’ experience with a MS/MA or 7 years’ experience with a PhD. or 16 years' w/o a degree or 14 years' with AS/AA
  • A current, active DoD security clearance at the TS/SCI level
  • US citizenship is required
  • DoD 8140 role for WRC: 462; Element: CS; Work Role: Control Systems Security Specialist; Proficiency Level: Advanced / Ability to obtain

Nice To Haves

  • DoD-approved IA baseline certification for ADP-III/IT-III based on the IAT level and CE/Operating System (OS) certificate within six months of the assignment.

Responsibilities

  • Provides technical and management leadership for all RMF support functions across the Task Order, establishing overarching goals and strategic plans for comprehensive security authorization strategies for C2ISR information systems and networks.
  • Directs and controls the strategic design, development, and implementation of advanced RMF processes, ensuring systematic integration into acquisition and systems engineering lifecycles.
  • Possesses expert domain and technical knowledge in RMF, C2ISR systems, and cybersecurity, applying this to define and drive the technical roadmap for developing detailed Security Authorization Packages (SSPs, SARs, POA&Ms).
  • Has overall responsibility for establishing and implementing innovative approaches that ensure successful obtainment of IATTs, ATOs, and ATCs for all C2ISR information systems and networks.
  • Engages in high-level client negotiations and interfaces with senior management regarding the strategic vision, capabilities, and resource allocation for advanced RMF compliance solutions.
  • Utilizes expert domain knowledge and decision-making that has a critical impact on the overall project implementation, ensuring RMF effectively addresses emerging security challenges and mission requirements.
  • Directs and controls the methods and staffing for RMF support teams, ensuring delivery of high-impact, scalable, and resilient security authorization efforts that optimize C2ISR system security.
  • Provides authoritative guidance on all aspects of RMF processes, security control assessments, and security control effectiveness across information system domains.
  • Establishes and governs the architectural principles, tools, and platforms for all RMF support efforts, critically impacting the reliability, resilience, and security effectiveness of C2ISR systems.
  • Shapes the future direction of C2ISR RMF support for the Task Order by pioneering new authorization techniques, research, and advanced compliance strategies, directly impacting mission success and national security.
  • Safeguard sensitive and critical information systems
  • Proactively research and mitigate new and evolving technological threats
  • Research and stay current on newly released threat prevention strategies from vendors and research orgs (CISA, NIST, MITRE, SANS, ISACA)
  • Support and assist official Cyber Operational Readiness Assessment (CORA), IG, and other official audits, inspections, and investigations
  • Assist with the implementation of system controls IAW NIST SP 800-39 and 800-47
  • Assist with the performance of STIGs and their assessments IAW NIST SP 800-128 and 800-216
  • Assist with the validation of facility security requirements and upload of certification evidence
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service