ISSO II

General Dynamics Information Technology
6d$114,750 - $155,250Onsite

About The Position

Provides support for a program, organization, system, or enclave’s information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF). Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies. Assist with preparation and maintenance of documentation. Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information. Assist with the CM for information system security software, hardware, and firmware (U) Maintain records on workstations, servers, routers, firewalls, intelligent hubs , network switches, etc. to include system upgrades. Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies. Develop and maintain documentation for C&A in accordance with ODNI and DoD policies. Provide CM for security-relevant information system software, hardware, and firmware. Develop system security policy and ensures compliance. Evaluate security solutions to ensure they meet security requirements for processing classified information. Maintain operational security posture for an information system or program. Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave. Develop and update the system security plan and other IA documentation. Assist with the management of security aspects of the information system and perform day-today security operations of the system. Administer the user identification and authentication mechanism of the Information System (IS). Obtain C&A for ISs under their purview. Provide support for a program, organization, system, or enclave’s information assurance program. Plan and coordinate the IT security programs and policies. Manage and control changes to the system and assessing the security impact of those changes. Serve as the Approval Authority for ISs under their control. Ten (10) years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required. Experience is to include at least two (2) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools. Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required. DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor’s degree. GDIT IS YOUR PLACE: ● Full-flex work week to own your priorities at work and at home ● 401K with company match ● Comprehensive health and wellness packages ● Internal mobility team dedicated to helping you own your career ● Professional growth opportunities including paid education and certifications ● Cutting-edge technology you can learn from #MD_2025Alumni The likely salary range for this position is $114,750 - $155,250. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.

Requirements

  • 10 years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required.
  • Experience is to include at least two of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.
  • Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required.
  • DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required.
  • US Citizenship Required
  • Clearance Level Must Currently Possess: Top Secret SCI + Polygraph
  • Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph

Responsibilities

  • Proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
  • Maintaining operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
  • Managing security aspects of the information system and performs day-to-day security operations of the system.
  • Evaluating security solutions to ensure they meet security requirements for processing classified information.
  • Performing vulnerability/risk assessment analysis to support certification and accreditation.
  • Providing configuration management (CM) for information system security software, hardware, and firmware.
  • Managing changes to system and assesses the security impact of those changes.
  • Preparing and reviewing documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
  • Supporting security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).
  • Implementing, and enforcing information systems security policies, standards, and methodologies.
  • Assisting with preparation and maintenance of documentation.
  • Assisting in the evaluation of security solutions to ensure they meet security requirements for processing classified information.
  • Assisting with the CM for information system security software, hardware, and firmware
  • Maintaining records on workstations, servers, routers, firewalls, intelligent hubs , network switches, etc. to include system upgrades.
  • Developing and maintaining documentation for C&A in accordance with ODNI and DoD policies.
  • Providing CM for security-relevant information system software, hardware, and firmware.
  • Developing system security policy and ensures compliance.
  • Maintaining operational security posture for an information system or program.
  • Supporting the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave.
  • Developing and updating the system security plan and other IA documentation.
  • Administering the user identification and authentication mechanism of the Information System (IS).
  • Obtaining C&A for ISs under their purview.
  • Planning and coordinating the IT security programs and policies.
  • Serving as the Approval Authority for ISs under their control.

Benefits

  • Full-flex work week to own your priorities at work and at home
  • 401K with company match
  • Comprehensive health and wellness packages
  • Internal mobility team dedicated to helping you own your career
  • Professional growth opportunities including paid education and certifications
  • Cutting-edge technology you can learn from

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service