JOIN THE TEAM TODAY!

Our reputation is built on the skills and successes of our employees.

Information Systems Security Officer Level 2

Learn more about this opportunity below: 7494-TKO - Information Systems Security Officer Level 2

Clearance: TS/SCI FSP

Location: Linthicum

 

 

Required Skills:

The TKO program is seeking an ISSO to support the Transformation Solutions Branch for the Data Normalization & Automation (DNA) TTO. The responsibilities will include maintaining 3 SSPs, coordinating patching processes between development tools and SA teams, review daily audit logs, troubleshooting entitlement issues, and reviewing and updating security controls. Must be familiar with the customers security workflow process.

Required Skills:

• Tech Requirement Security+

• Experience with XACTA, LATTEART, BISCOTTI, CIVET, DARKROAST, CYBORGBUNNY

• Experience with GATEKEEPER and the entitlement process

• Writing/updating SSPS

• Track IAVAs

• Generate BISCOTTI POA&Ms

 

Additional desired skills:

• Tech Requirement CISSP, CAP CASP

• Familiar with Nessus Can Results

• Write/Update SECCONOP

• Draft Systems Boundary/Dataflow Diagrams

• Developing a patching process between SA & Development teams

 

Description:

The Information Systems Security Officer (ISSO) shall provide support for a program, organization, system, or enclave’s information assurance program. The ISSO provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure the y meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides confirmation management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).The Information Systems Security Officer (ISSO) shall provide support for a program, organization, system, or enclave’s information assurance program. The ISSO provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure the y meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides confirmation management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).

 

Ten (10) years’ experience as an ISSO on programs and contracts of similar scope, type, and complexity is required. Experience is to include at least two (2) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools. Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required. DoD 8570 compliance with Information Assurance Management (IAM) Level 1 or higher is required. Four (4) years of additional ISSO experience may be substituted for a bachelor’s degree.

Description

Job Application

Fill out our application below and we will contact you at our earliest convenience.

arrow&v
Place Resume Here

Thanks for submitting!