Information Systems Security Officer (ISSO)

True AnomalyLong Beach, CA
Onsite

About The Position

A new space race has begun, and True Anomaly is seeking individuals with the talent and ambition to develop innovative technology for space security and sustainability. The company's mission is to ensure the peaceful use of space, which is vital for global prosperity, by building technology at the intersection of spacecraft, software, and AI. This technology aims to enhance the capabilities of the U.S., its allies, and commercial partners, thereby safeguarding global security and ensuring space access and sustainability for all. The Information Systems Security Officer (ISSO) will be responsible for overseeing the security posture of all classified information systems and for developing and revising necessary Risk Management Framework (RMF) documentation to support system authorization. This role reports to the Vice President of Facilities and Government Security and is an onsite position in Long Beach, CA.

Requirements

  • 7-12 years of relevant work experience.
  • Assist with information system security management and day-to-day security operations.
  • Serve as a member of the Change Control Board (CCB) to ensure configuration management for Cybersecurity-relevant software, hardware, and firmware is maintained and documented.
  • Ensure all personnel receive the necessary technical and security training to perform their duties effectively.
  • Conduct security reviews of proposed changes or additions to the information system (including hardware or software) and advise the Information System Security Manager (ISSM) on security relevance.
  • Perform vulnerability/risk assessment analysis to support continuous monitoring and the certification and accreditation process.
  • U.S. Citizen and eligible for DoD Secret or TS/SCI clearance.

Nice To Haves

  • Current active DoD TS/SCI clearance.

Responsibilities

  • Build and update standard RMF packages, including the Systems Security Plan (SSP), Plan of Actions and Milestones (POAMs), Security Control Traceability Matrix (SCTM), hardware and software inventories, and network topology diagrams.
  • Lead the development and implementation of security policies and procedures required by assessment and authorization activities in accordance with ICD-503, DAAPM, NISPOM, JSIG, and NIST 800-53.
  • Program guidance and direction to program personnel, ensuring effective communication within the roles.
  • Collaborate with System Administrators and Network Engineers to ensure timely application of security patches and secure configurations in line with Security Technical Implementation Guidelines (STIGs).

Benefits

  • Health
  • Dental
  • Vision
  • HRA/HSA options
  • PTO
  • paid holidays
  • 401K
  • Parental Leave

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Senior

Education Level

No Education Listed

Number of Employees

11-50 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service