Information Systems Security Officer

OshkoshNew Hudson, MI
4dOnsite

About The Position

Pratt Miller is a product development company in motorsports, defense, and mobility industries providing clients with product engineering and low-volume production solutions. Our range of research & development, engineering, prototype manufacturing, test & validation, and low-rate production capability help our customers bring their high-quality products to market faster. The Information Systems Security Officer (ISSO) is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM. The position should have the detailed knowledge and expertise required to manage the environment for information systems and, responsible for day-to-day security and monitoring for up-time and critical errors. This will include physical and environmental protection, incident handling, and system support. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendations to the ISSM. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. The role will also support information technology special projects and required systems that are dedicated to those projects including but not limited to hypervisor, application, network, support and general troubleshooting. PLEASE NOTE THIS POSITION IN ONSITE IN NEW HUDSON, MI

Requirements

  • Strong documentation skills for configurations, compliance evidence, and SOPs.
  • Foundational understanding of network, operating systems, servers, security, and application management lifecycle.
  • Execute the orchestration of job processing to enhance system performance.
  • Ability to clearly explain complex security concepts to both technical and non-technical audiences.
  • Collaborative and communicative, with consistent effectiveness working across disciplines.
  • Be able to implement and maintain NIST 800-53 and NIST 800-171 controls in an environment.
  • Auditing experience within the context of meeting government or defense compliance.
  • Be able to run and understand security vulnerability reports and act on those to secure the environment appropriately.
  • Experience with Windows workstation/server operating systems, Linux operating systems, and hypervisors.
  • Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field; advanced degree preferred.
  • Must meet the requirements for obtaining a U.S. Government clearance; active Secret or higher clearance preferred .
  • Completed the Security+ Certification or working towards getting it within the first 90 days of employment.
  • Experience with RMF, NIST 800-53, DFARS 252.204-7012, CMMC Level 2, and NIST 800-171 compliance in defense or government environments.
  • 1-5 years’ experience within a defense contractor or equivalent environment managing IT systems and compliance process.

Responsibilities

  • Providing day-to-day operational support and troubleshooting for the application and infrastructure environment through system upgrades and performance management.
  • Work on supporting a VDI environment (Citrix VMware/Nutanix), including deploying new hardware, supporting overall health of environment, and supporting virtual workstations and servers.
  • Ensure appropriate operational security posture is maintained for an information system.
  • Assist the ISSM in meeting duties and responsibilities.
  • Prepare, review, and update authorization packages.
  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s).
  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
  • Coordinate incident response activities with ISSM and Cybersecurity teams.
  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
  • Identify cyber security vulnerabilities and assist with the implementation of patches or mitigations for them.
  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
  • Monitor system recovery processes to ensure security features and procedures are properly restored and function correctly.
  • Configuration, certification, and auditing/analysis of Windows/Linux operating systems in Peer-to-peer, LAN, and WAN network environments
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service