Information Systems Security Officer (ISSO)

Accenture Federal ServicesFort Washington, MD
10h

About The Position

At Accenture Federal Services, nothing matters more than helping the US federal government make the nation stronger and safer and life better for people. Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations. Join Accenture Federal Services, a technology company within global Accenture. Recognized as a Glassdoor Top 100 Best Place to Work, we offer a collaborative and caring community where you feel like you belong and are empowered to grow, learn and thrive through hands-on experience, certifications, industry training and more. Join us to drive positive, lasting change that moves missions and the government forward! Accenture Federal Services is seeking an Information Systems Security Officer (ISSO) will protect the organization's IT infrastructure and data by implementing, monitoring, and maintaining security policies, controls, and compliance standards. They manage risk, handle incident responses, maintain system documentation (such as System Security Plans), and ensure compliance with regulatory frameworks.

Requirements

  • 3 years of experience as a cyber security professional
  • Experience with cloud security (AWS preferred)
  • Experience with Risk Management Framework (RMF)
  • Experience with NIST frameworks, Risk Management Framework (RMF), firewalls, and intrusiondetection systems
  • Expert knowledge of Unix/Linux operating systems, databases, web servers,or networking technologies
  • IAT II certification required which would include any of the following: CCNA Security CySA+ GICSP GSEC Security+ CE SSCP

Nice To Haves

  • Bachelor’s degree
  • Endpoint security experience
  • Strong knowledge and experience with RHEL command line
  • Experience supporting the accreditation of cloud-based systems (AWS preferred)

Responsibilities

  • Monitor information systems for threats, audit records, and ensure security controls are functioning.
  • Develop, maintain, and review authorization packages (System Security Plans - SSPs), and create Plans of Actions and Milestones (POA&Ms) for non-compliant items.
  • Conduct vulnerability assessments, identify risks, and recommend mitigation strategies to the Information System Security Manager (ISSM) or Authorizing Official (AO)
  • Support security investigations, incident handling, and reporting
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service