LOCATION: Annapolis Junction, MD SHIFT: Day: Monday thru Friday
DUTIES AND RESPONSIBILITIES
Review Nessus/ACAS scan results and provide direction where required
Recognizes potential, successful, and unsuccessful scan results for efficiency in reporting compromises thorough reviews and analyses of relevant event detail and summary information
Evaluate systems baseline security state (STE, Health & Status) verified through Xacta and LatteArt source of record systems
Review and mitigate liens (POAMS)- continuous assessment
Collaborate and develop Splunk use case dashboard reporting for security baseline. Weekly reporting of system health status
100% Scan compliance validation for systems
Maintain 98% asset accountability for in scope systems
Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems. Assists with implementation of counter-measures or mitigating controls
Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans
Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools. Safeguards the network against unauthorized infiltration, modification, destruction or disclosure
Responds to queries and requests for computer security information and reports. Conducts investigations of computer security violations and incidents, reporting as necessary to management
Researches, evaluates, tests, recommends, communicates and implements new security software or devices
Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications
Develops materials for computer security education/awareness programs
Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies
Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance
Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information
Provides advanced guidance and leadership to less-experienced team members
May serve as a team or task leader. (Not a people manager)
Provides information assurance project management, technical security staff oversight, and development of mission-critical technical documents
Ensure compliance with regulations and privacy laws
REQUIREMENTS & EXPERIENCE
TS/SCI CLEARANCE WITH POLY REQUIRED
Must meet 8570 IAT II requirements to include one of the following certifications: CCNA Security, GIC SP, GSEC, Security+ CE, SSCP, CASP CE, CCNP Security, CISA, CISSP, GCED, GCIH, CSA+.
Position requires Seven (7) years of experience as an ISSO on programs and contracts of similar scope, type, and complexity are required.
Experience is to include at least one (2) of the following areas: knowledge of current security tools and hardware/software security implementation; communication protocols; encryption techniques/tools.
Bachelor's degree in Computer Science or related discipline from an accredited college or university is required. DoD 8570 compliance with IAT Level I or higher is required.
Four (4) years of additional experience as an ISSO may be substituted for a Bachelor's degree.
On call required for 24x7 support - Essential personnel
Strong analytical and problem-solving skills
Strong communications skills
Ability to lead and work as part of a team
GW-230309D250009ISSO2
GW-230309D250010ISSO2