Information Systems Security Officer

Booz Allen HamiltonUsa, MD
5d

About The Position

Information Systems Security Officer Key Role: Join a team of communications and systems engineers supporting engineering, sustainment, and management of communications systems. Perform ongoing system analysis activities for programs. Perform risk assessments of systems and equipment, assist engineers with identifying solutions for vulnerabilities, create and map Security Technical Implementation Guides (STIGs), submit change requests for system components, develop a Plan of Action and Milestones (POA&M), create documentation supporting Risk Management Framework (RMF) accreditations, perform vulnerability management using automated systems, and create and submit RMF packages. Brief the technical security posture to client leadership, prepare brief slides and summaries of vulnerabilities, and advise on how to prevent and mitigate future security threats. Develop relationships quickly and easily with other teams, communicating the complexities of security with a wide variety of audiences, including senior management. Implement infrastructure and cyber security controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. Perform risk and vulnerability assessments in network, system, and application areas. Leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise.

Requirements

  • 5+ years of experience with information assurance or cybersecurity
  • Experience serving as an Information Systems Security Officer (ISSO)
  • Experience managing and administering Assured Compliance Assessment Solution (ACAS) and Host-Based Security System (HBSS)
  • Experience utilizing the Enterprise Mission Assurance Support Service (eMASS) to address security controls, create POA&Ms, and upload artifacts, such as STIG checklists or ACAS scans
  • Experience with supporting system security and authorization processes
  • Experience reviewing vulnerability documentation and writing Residual Risk statements
  • Experience in reporting IT security events or incidents based on policies and procedures
  • Knowledge of Microsoft Defender for Endpoint (MDE)
  • Secret clearance
  • Bachelor's degree

Nice To Haves

  • Knowledge of Cloud-based infrastructure and DevSecOps principles and practices
  • Ability to use and operate security tools, including Tenable Nessus, SecurityCenter, IBM Guardium, HP WebInspect, or Network Mapper
  • Bachelor's degree in information technology

Responsibilities

  • Perform ongoing system analysis activities for programs
  • Perform risk assessments of systems and equipment
  • Assist engineers with identifying solutions for vulnerabilities
  • Create and map Security Technical Implementation Guides (STIGs)
  • Submit change requests for system components
  • Develop a Plan of Action and Milestones (POA&M)
  • Create documentation supporting Risk Management Framework (RMF) accreditations
  • Perform vulnerability management using automated systems
  • Create and submit RMF packages
  • Brief the technical security posture to client leadership
  • Prepare brief slides and summaries of vulnerabilities
  • Advise on how to prevent and mitigate future security threats
  • Implement infrastructure and cyber security controls
  • Perform risk and vulnerability assessments in network, system, and application areas
  • Leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise

Benefits

  • health
  • life
  • disability
  • financial
  • retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
  • recognition awards program
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service