drjobs Information Systems Security Officer Level 3

Information Systems Security Officer Level 3

Employer Active

1 Vacancy
The job posting is outdated and position may be filled
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Fort Meade, MD - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

About the Position

  • Provides support for a program organization system or enclave s information assurance program.
  • Provides support for proposing coordinating implementing and enforcing information systems security policies standards and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies standards and procedures are established and followed.
  • Assists with the management of security aspects of the information system and performs day today security operations of the system.
  • Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation.
  • Provides configurationnmanagement (CM) for information system security software hardware and firmware.
  • Manages changes to system and assesses the security impact of those changes.
  • Prepares and reviews documentation to include System Security Plans (SSPs) Risk Assessment Reports Certification and Accreditation (C&A) packages and System Requirements Traceability Matrices (SRTMs).
  • Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).

Responsibilities:

  • Provide support to senior ISSOs for implementing and enforcing information systems security policies standards and methodologies.
  • Assist with preparation and maintenance of documentation.
  • Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information.
  • Assist with the CM for information system security software hardware and firmware.
  • Maintain records on workstations servers routers firewalls intelligent hubs network switches etc. to include system upgrades.
  • Propose coordinate implement and enforce information systems security policies standards and methodologies.
  • Develop and maintain documentation for C&A in accordance with ODNI and DoD policies.
  • Provide CM for securityrelevant information system software hardware and firmware.
  • Develop system security policy and ensures compliance.
  • Evaluate security solutions to ensure they meet security requirements for processing classified information.
  • Maintain operational security posture for an information system or program.
  • Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system program or enclave.
  • Develop and update the system security plan and other IA documentation.
  • Assist with the management of security aspects of the information system and perform day today security operations of the system.
  • Administer the user identification and authentication mechanism of the Information System (IS).
  • Obtain C&A for ISs under their purview.
  • Provide support for a program organization system or enclave s information assurance program.
  • Plan and coordinate the IT security programs and policies.
  • Manage and control changes to the system and assessing the security impact of those changes.
  • Manage and control changes to the system and assessing the security impact of those changes.
  • Serve as the Approval Authority for ISs under their control.
  • Provide daily oversight and direction to contractor ISSOs.
  • Serve as an ISSM.
  • Interact with customers IT staff and highlevel corporate officers to define and achieve required IA objectives.




Requirements

Required Education & Years of Experience:

  • Fifteen 15 years experience as an ISSO on programs and contracts of similar scope type and complexity is required.
  • Experience is to include at least three 3 of the following areas: knowledge of current security tools hardware/software security implementation; communication protocols; and encryption techniques/tools.
  • Bachelor s degree in Computer Science or related discipline from an accredited college or university is required.
  • Four 4 years of additional experience as an ISSO may be substituted for a bachelor s degree.
  • DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required.


Required Education & Years of Experience: Fifteen 15 years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required. Experience is to include at least three 3 of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools. Bachelor s degree in Computer Science or related discipline from an accredited college or university is required. Four 4 years of additional experience as an ISSO may be substituted for a bachelor s degree. DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required. Benefits: Holiday Benefit: 10 Holidays per year Vacation Benefit: 10 Vacation Days per year. Accrued on weekly basis. Sick Leave Benefit: 5 Personal/Sick Leaves per year. Accrued on weekly basis Medical Insurance Reimbursement Benefit: Medical Insurance Allowance QSEHRA Reimbursement (Eligibility date dependent on enrollment.Employee purchase own plan) AFLAC Supplemental Insurance Plan: AFLAC Supplemental Insurance Plan 401 (K) Retirement Plan: 401 (K) Retirement Savings Plan

Employment Type

Full Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.