Navy Recruiting Commandposted 5 months ago
Full-time
Ridgecrest, CA

About the position

The incumbent serves as an Information Systems Security Officer (ISSO) at China Lake, CA. The primary responsibility of the ISSO is to ensure the confidentiality, integrity, and availability of systems, networks, and data. This is achieved through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools. The individual in this role must have or be eligible to obtain a DoD Top Secret security clearance based on a Single Scope Background Investigation (SSBI). Additionally, the candidate must currently possess or be able to obtain a DoD 8570.01-M IA baseline IAT level II or IAM level I certification within the first six months of employment. The position requires the ability to travel periodically to support the organization's cybersecurity operations and cyber-thrusts, and candidates should have 1-3 years of information assurance or cybersecurity-related experience. Functions commonly performed by employees in this specialty include assisting the Information Systems Security Manager (ISSM) by developing policies and procedures to ensure information systems reliability and accessibility, as well as preventing and defending against unauthorized access to systems, networks, and data. The ISSO may assume ISSM responsibilities in the absence of the ISSM and is responsible for conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs. Promoting awareness of security issues among management and ensuring sound security principles are reflected in the organization's visions and goals is also a key function. The ISSO will conduct systems security evaluations, audits, and reviews, develop systems security contingency plans and disaster recovery procedures, and serve as a member of the Change Control Board (CCB). They will also develop and implement programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures. Participation in network and systems design to ensure the implementation of appropriate systems security policies is expected, as well as assessing security events to determine impact and implementing corrective actions. The ISSO will ensure the rigorous application of information security/information assurance policies, principles, and practices in the delivery of all IT services, monitor system recovery processes, and ensure audit records are collected, reviewed, and documented, including any anomalies.

Responsibilities

  • Assist the Information Systems Security Manager (ISSM) by developing policies and procedures to ensure information systems reliability and accessibility and to prevent and defend against unauthorized access to systems, networks, and data.
  • Assume ISSM responsibilities in the absence of the ISSM.
  • Conduct risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs.
  • Promote awareness of security issues among management and ensure sound security principles are reflected in organizations' visions and goals.
  • Conduct systems security evaluations, audits, and reviews.
  • Develop systems security contingency plans and disaster recovery procedures.
  • Serve as a member of the Change Control Board (CCB).
  • Develop and implement programs to ensure that systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures.
  • Participate in network and systems design to ensure implementation of appropriate systems security policies.
  • Assess security events to determine impact and implement corrective actions.
  • Ensure the rigorous application of information security/information assurance policies, principles, and practices in the delivery of all IT services.
  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
  • Ensure audit records are collected, reviewed, and documented (to include any anomalies).

Requirements

  • Must have or be eligible to obtain a DoD Top Secret security clearance based on a Single Scope Background Investigation (SSBI).
  • Currently possess or obtain a DoD 8570.01-M IA baseline IAT level II or IAM level I certification within the first six months of employment.
  • 1-3 years of information assurance or cybersecurity related experience.
  • Ability to travel periodically in support of the organization's cybersecurity operations and cyber-thrusts.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service