The incumbent serves as an Information Systems Security Officer (ISSO) at China Lake, CA. The primary responsibility of the ISSO is to ensure the confidentiality, integrity, and availability of systems, networks, and data. This is achieved through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools. The individual in this role must have or be eligible to obtain a DoD Top Secret security clearance based on a Single Scope Background Investigation (SSBI). Additionally, the candidate must currently possess or be able to obtain a DoD 8570.01-M IA baseline IAT level II or IAM level I certification within the first six months of employment. The position requires the ability to travel periodically to support the organization's cybersecurity operations and cyber-thrusts, and candidates should have 1-3 years of information assurance or cybersecurity-related experience. Functions commonly performed by employees in this specialty include assisting the Information Systems Security Manager (ISSM) by developing policies and procedures to ensure information systems reliability and accessibility, as well as preventing and defending against unauthorized access to systems, networks, and data. The ISSO may assume ISSM responsibilities in the absence of the ISSM and is responsible for conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs. Promoting awareness of security issues among management and ensuring sound security principles are reflected in the organization's visions and goals is also a key function. The ISSO will conduct systems security evaluations, audits, and reviews, develop systems security contingency plans and disaster recovery procedures, and serve as a member of the Change Control Board (CCB). They will also develop and implement programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures. Participation in network and systems design to ensure the implementation of appropriate systems security policies is expected, as well as assessing security events to determine impact and implementing corrective actions. The ISSO will ensure the rigorous application of information security/information assurance policies, principles, and practices in the delivery of all IT services, monitor system recovery processes, and ensure audit records are collected, reviewed, and documented, including any anomalies.