Computer Circuit Board

Information Systems Security Officer

Roles and Responsibilities:                                               
• Review Nessus/ACAS scan results and provide direction where required
• Recognizes potential, successful, and unsuccessful scan results for efficiency in reporting compromises thorough reviews and analyses of relevant event detail and summary information
• Evaluate systems baseline security state (STE, Health & Status) verified through Xacta and LatteArt source of record systems
• Review and mitigate liens (POAMS)- continuous assessment
• Collaborate and develop Splunk use case dashboard reporting for security baseline
• Weekly reporting of system health status
• 100% Scan compliance validation for systems
• Maintain 98% asset accountability for in scope systems
• Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems
• Assists with implementation of counter-measures or mitigating controls
• Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans
• Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools
• Safeguards the network against unauthorized infiltration, modification, destruction or disclosure
• Responds to queries and requests for computer security information and reports
• Conducts investigations of computer security violations and incidents, reporting as necessary to management
Roles and Responsibilities (cont.):
• Researches, evaluates, tests, recommends, communicates and implements new security software or devices
• Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications
• Develops materials for computer security education/awareness programs
• Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies
• Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance
• Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information
• Provides advanced guidance and leadership to less-experienced team members
• May serve as a team or task leader. (Not a people manager)
• Provides information assurance project management, technical security staff oversight, and development of mission-critical technical documents
• Ensure compliance with regulations and privacy laws

Must meet contract level requirements for appropriate position.  In addition, position requires Five (5) years of experience as an ISSO on programs and contracts of similar scope, type, and complexity are required. Experience is to include at least one (1) of the following areas: knowledge of current security tools and hardware/software security implementation; communication protocols; encryption techniques/tools. Bachelor's degree in Computer Science or related discipline from an accredited college or university is required. DoD 8570 compliance with IAT Level I or higher is required. Four (4) years of additional experience as an ISSO may be substituted for a Bachelor's degree.

Experience should include:
• On call required for 24x7 support - Essential personnel
• Strong analytical and problem-solving skills
• Strong communications skills
• Ability to lead and work as part of a team


(Candidate shall have appropriate certification in compliance with the requirements of the DoD 8570 Information Assurance Category IAT Level II.  Security+, or higher cert required.)

Immediate day shift position available.   (Day shift, Monday thru Friday)  

REQUIRES TS/SCI CLEARANCE WITH POLY

*GW*