[Close] 

Information Systems Security Officer (ISSO) Skill Level 3

Company Name:
Ross Technologies, Inc.
Information Systems Security Officer (ISSO) Skill Level 3
Location: Laurel, MD
# of openings: 1
Required Clearance: TS w/Polygraph
Description
POSITION DESCRIPTION
Provides support for a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with NSA/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Information Assurance Certification and Accreditation Process (DIACAP).
The Level 3 Information Systems Security Officer (ISSO) shall possess the following capabilities:
Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
Assist with the CM for information system security software, hardware, and firmware
Assist with preparation and maintenance of documentation
Maintain records on workstations, servers, routers, firewalls, intelligent hubs , network switches, etc. to include system upgrades
Evaluate security solutions to ensure they meet security requirements for processing classified information
Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies
Maintain operational security posture for an information system or program
Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
Develop and update the system security plan and other IA documentation
Provide CM for security-relevant information system software, hardware, and firmware
Assist with the management of security aspects of the information system and perform day-today security operations of the system
Develop system security policy and ensures compliance
Administer the user identification and authentication mechanism of the Information System (IS)
Plan and coordinate the IT security programs and policies
Manage and control changes to the system and assessing the security impact of those changes
Manage and control changes to the system and assessing the security impact of those changes
Obtain C&A for ISs under their purview
Provide support for a program, organization, system, or enclave's information assurance program
Serve as the Approval Authority for ISs under their control
Interact with customers, IT staff, and high-level corporate officers to define and achieve required IA objectives
Provide daily oversight and direction to contractor ISSOs
Serve as an ISSM
Qualifications:
Fifteen (15) years' experience as an ISSO on programs and contracts of similar scope, type, and complexity is required. Experience is to include at least three (3) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools. Bachelor's degree in Computer Science or related discipline from an accredited college or university is required. DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor's degree.
Domain Area(s) Specialized Requirements: Unless otherwise specified in the description field, five (5) years of demonstrated experience is required for the domain items described below:
Information Assurance
Contractor shall have appropriate certification and comply with the requirements associated with the "Information Assurance Management" category (IAM) in accordance with the Information Assurance Workforce Improvement Program (DoD8570.01-M)
Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance with polygraph is required.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.