JOIN THE TEAM TODAY!
Our reputation is built on the skills and successes of our employees.
ISSO Level 1
Learn more about this opportunity below: 6362-EI - ISSO Level 1
Clearance: TS/SCI FSP
-Five (5) years of experience as an ISSO in programs and contracts of similar scope, type, and complexity to include experience in at least one (1) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.
-Hold a Bachelor’s of Science degree in Computer Science or related discipline from an accredited college or university. (Four additional years of experience as an ISSO may be substituted for a Bachelor’s degree.)
-Meet the requirement for DoD 8570 compliance with Information Assurance Technical (IAT) Level I or higher.
The Level 1 ISSO shall possess the following capabilities:
-Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
-Assist in the evaluation of security solutions to ensure they met security requirements for processing classified information
-Assist with the CM for information system security software, hardware, and firmware
-Assist with preparation and maintenance of documentation
-Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
-Evaluate security solutions to ensure they meet security requirements for processing classified information
-Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies
-Maintain operational security posture for an information system or program
-Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
-Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
-Develop and update the system security plan and other IA documentation
-Provide CM for security-relevant information system software, hardware, and firmware
-Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
-Develop system security policy and ensured compliance
-Administer the user identification and authentication mechanism of the information system