SITEC, Information Systems Security Officer, Fort Bragg, NC

PeratonFort Bragg, NC
34d$80,000 - $128,000Onsite

About The Position

Peraton requires an Information Systems Security Officer to support the Special Operation Command Information Technology Enterprise Contract (SITEC) – 3 Enterprise Operations and Maintenance (EOM) Task Order. This position is located at Fort Bragg, NC. Information Systems Security Officer (ISSO) The candidate must have expert knowledge and demonstrated experience with cybersecurity technologies, risk management, and incident response procedures as well as have a solid working understanding of computer functions, including hardware, software, and operating systems. This includes knowledge of Windows, Unix, and Linux operating systems, along with other applications such as databases, web servers, networking technologies, including routing, switching, and VPNs. It’s a bonus if the candidate has experience with cloud computing platforms such as AWS and Azure. The ISSO must be able to work autonomously, manage their workload effectively, shift priorities with little to no loss of productivity and communicate effectively with technical and non-technical personnel. Well-versed in best practices for cyber security program standards, processes, and procedures compliance, industry-standard security frameworks and demonstrated expert working knowledge of NIST Special Publication (SP) 800-53: Recommended Security Controls for Federal Information Systems, NIST SP 800-53A: Guide for Assessing the Security Controls in Federal Information Systems, AFPD 17-1 and AFI 17-130, Cybersecurity Program Management. Ability writing security policies and procedures, CSS, SSP, SSPP, and assess all ATO package artifacts. Expert knowledge of Risk Management Framework (RMF) v5 (Processes, workflow, etc.). Ability to use eMASS to execute , RMF v5 to include document / update system status, identify, document, and manage implementation of operational and technical security controls, implementation and risk assessment tabs, non-compliant and non-validated controls, POAM management (entry, evidence, close-out), produce report and track Plan of Action and Milestone (POA&M) due dates, etc. The ability to complete a checklist to ensure Security Authorization Process documents are complete and comply with all guidance. Ability to work collaboratively with IT counterparts, communicate effectively (skilled in communicating complex technical information to non-technical audience) and coordinate STIG remediation with system administrators and developers. Ability to conduct risk assessments, monitor security Incidents and respond appropriately to Security Threats. Working understanding of network technology (includes knowledge of network protocols, TCP/IP), operating systems as well as the necessary security protocols, system details (Architecture, data flow, security cat, requirements, configuration management process/procedures, and user profile) firewalls, rules and configurations, intrusion detection tools and prevention systems, encryption techniques, Windows, Unix, and Linux) operating systems, along with other applications such as databases and web servers.

Requirements

  • A DoD security clearance at the TS/SCI level is required.
  • Minimum of 8 years with BS/BA; Minimum of 10 years with AS/AA; Minimum of 6 years with MS/MA, or High School Diploma and 12 years of experience
  • DoD IAT Level II certification (e.g., Security+ CE, CCNA Security, CySA+, GICSP, GSEC, or SSCP) required
  • Ability to execute tasks with little to no oversight or support as well as manage multiple, and at times, competing priorities without loss of productivity.

Nice To Haves

  • Experience transitioning from RMF v4 to v5.
  • Basic understanding of identity and access management system capabilities and configuration.
  • Experience with cloud computing platforms such as AWS and Azure.
  • Experience with TASKORDS, OPORDS, etc.
  • Experience leading Cybersecurity (ISSO & ISSE) teams

Responsibilities

  • Expert knowledge and demonstrated experience with cybersecurity technologies, risk management, and incident response procedures
  • Solid working understanding of computer functions, including hardware, software, and operating systems
  • Work autonomously, manage their workload effectively, shift priorities with little to no loss of productivity and communicate effectively with technical and non-technical personnel
  • Well-versed in best practices for cyber security program standards, processes, and procedures compliance, industry-standard security frameworks
  • Expert working knowledge of NIST Special Publication (SP) 800-53: Recommended Security Controls for Federal Information Systems, NIST SP 800-53A: Guide for Assessing the Security Controls in Federal Information Systems, AFPD 17-1 and AFI 17-130, Cybersecurity Program Management
  • Ability writing security policies and procedures, CSS, SSP, SSPP, and assess all ATO package artifacts
  • Expert knowledge of Risk Management Framework (RMF) v5 (Processes, workflow, etc.)
  • Ability to use eMASS to execute , RMF v5 to include document / update system status, identify, document, and manage implementation of operational and technical security controls, implementation and risk assessment tabs, non-compliant and non-validated controls, POAM management (entry, evidence, close-out), produce report and track Plan of Action and Milestone (POA&M) due dates, etc.
  • The ability to complete a checklist to ensure Security Authorization Process documents are complete and comply with all guidance
  • Ability to work collaboratively with IT counterparts, communicate effectively (skilled in communicating complex technical information to non-technical audience) and coordinate STIG remediation with system administrators and developers
  • Ability to conduct risk assessments, monitor security Incidents and respond appropriately to Security Threats
  • Working understanding of network technology (includes knowledge of network protocols, TCP/IP), operating systems as well as the necessary security protocols, system details (Architecture, data flow, security cat, requirements, configuration management process/procedures, and user profile) firewalls, rules and configurations, intrusion detection tools and prevention systems, encryption techniques, Windows, Unix, and Linux) operating systems, along with other applications such as databases and web servers.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

High school or GED

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service