We solve difficult business IT and analytic problems by addressing the whole problem not just the symptoms using interdisciplinary approaches that are both practical and innovative. We provide fresh alternatives to ordinary mainstream consulting firms through small highly skilled and hand-picked teams that can meet clients needs in any broad interdisciplinary understanding allows us to provide the right solution even if it is from outside the industry or traditionally defined problem space. We bring Public and Private Civilian and Military expertise to every case.
We are hiring a Sr. Information Systems Security Officer (ISSO) to work in Laurel MD. Position location is subjectto change based on central MD clients needs.
Required:TS/SCI with a Polygraph
Provides support for a program organization system or enclaves information assurance program. Provides support for proposing coordinating implementing and enforcing information systems security policies standards and methodologies. Maintains operational security posture for an information system or program to ensure information systems securitypolicies standards and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software hardware and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs) Risk Assessment Reports Certification and Accreditation (C&A) packages and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).
The Level 2 Information Systems Security Officer (ISSO) shall possess the following capabilities:
Provide support to senior ISSOs for implementing and enforcing information systems security policies standards and methodologies
Assist with preparation and maintenance of documentation
Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
Assist with the CM for information system security software hardware and firmware
Maintain records on workstations servers routers firewalls intelligent hubs network switches etc. to include system upgrades
Propose coordinate implement and enforce information systems security policies standards and methodologies
Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
Provide CM for security-relevant information system software hardware and firmware
Develop system security policy and ensures compliance
Evaluate security solutions to ensure they meet security requirements for processing classified information
Maintain operational security posture for an information system or program
Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system program or enclave
Develop and update the system security plan and other IA documentation
Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
Administer the user identification and authentication mechanism of the Information System (IS)
Obtain C&A for ISs under their purview
Provide support for a program organization system or enclaves information assurance program
Plan and coordinate the IT security programs and policies
Manage and control changes to the system and assessing the security impact of those changes
Serve as the Approval Authority for ISs under their control
Individual Capabilities/Experience Required:
Ten (10) years experience as an ISSO on programs and contracts of similar scope type and complexity is required.
Experience is to include at least two (2) of the following areas: knowledge of current security tools hardware/software security implementation; communication protocols; and encryption techniques/tools.
Bachelors degree in Computer Science or related discipline from an accredited college or university is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelors degree.
DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required.
We have all the PERKS! You are our most valuable resource your ambition your knowledge yourcreativity. We offer an industry-leading set of benefits to supplement your normalsalary compensation. We have you covered with flexible ways to balancework and home life full health benefit premium coverage and generouscontributions toward your retirement.
Competitive health dental and vision plans with 100% paid premiums.
401k: We contribute 6% even if you dont!
Time Off: 11 standard holidays and 25 days of PTO
Career Development: Get career counseling and individualized career development plans including education and training.
Employee referral bonuses for successful hires
We are anEqual Opportunity/Affirmative Action employer. We provide equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race color religion age sex national origin disability status genetics protected veteran status sexual orientation gender identity or expression or any other characteristic protected by federal state or local laws.
This policy applies to all terms and conditions of employment including recruiting hiring placement promotion termination layoff recall transfer leaves of absence compensation and training.
Power3 Solutions Partnering with federal state and local organizations to bring the best talent to the right roles.
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.