Tyto Athene is hiring a Senior Information System Security Officer (ISSO) to support one of our law enforcement customers in Washington, DC. The successful candidate will ensure information systems and high value assets (HVA) meet NIST security requirements, managing the entire Risk Management Framework (RMF) and Authorization to Operate (ATO) lifecycles. Responsibilities: Develop and update security authorization packages in accordance with the client's requirement and compliant with FISMA. Core documents that the candidate will be responsible for are the System Security Plan, Risk Assessment Report, Security Assessment Plan and Report, Contingency Plan, Incident Response Plan, Standard Operating Procedure, Plan of Actions and Milestones, Remediation Plans, Configuration Management Plan, etc. Develop and maintain the Plan of Action and Milestones and support remediation activities Validate protective measures for physical security are in place to support the system security requirements Maintain an inventory of hardware and software for the information system Develop, coordinate, test, and train on Contingency Plans and Incident Response Plans Perform risk analyses to determine cost-effective and essential safeguards Support Incident Response and Contingency activities Perform security control assessment in using NIST 800-53A Conduct independent scans of the application, network, and database (where required) Provide continuous monitoring to enforce client security policy and procedures and create processes that will provide oversight into the following activities for the system owner Coordinate with multiple stakeholders to complete mandatory agency data calls in a timely manner The ISSO should be intimately familiar with some aspects of the following: Federal Government Information Assurance policies and regulations to include OMB requirements, FISMA, and NIST 800 series OMB A-123 circular; OMB A-130 circular; FIPS 140, 199, 200, 201; NIST SP 800-18, 37 Revision 1, 39, 53 Revision 3 and 4, 53A Revision 1, 60 Volumes 1 and 2, 800-64 Revision 2, 137, 144, 147; CNSS 1253 and risk management methodologies Network, network protocols, routers, and switches and how they interact with automated vulnerability assessment tools, open-source vulnerability assessment tools, and techniques used for evaluating security controls on Windows, Linux, and Unix operating systems, networking devices, databases, and web servers Developing custom assessment scripts Network Security Architecture
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level