logo

View all jobs

Information Systems Security Officer 1 w/ 5 years experience

Annapolis Junction, MD · Information Technology
REQUIRED SKILLS/ABILITIES:
  • TO BE CONSIDERED FOR THIS POSITION YOU MUST HAVE AN ACTIVE OR REINSTATABLE TS/SCI W/ POLYGRAPH SECURITY CLEARANCE (U.S. CITIZENSHIP REQUIRED) 
Qualification: Five (5) years experience as an ISSO on programs and contracts of similar scope, type and complexity is required. Experience is to include at least one (1) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.

Skill: Evaluate security solutions to ensure they meet security requirements for processing classified information
Skill: Propose, coordinate, implement and enforce information systems security policies, standards, and methodologies
Skill: Maintain operational security posture for an information system or program
Skill: Provides support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program or enclave
Skill: Develop and updates the system security plan and other IA documentation
Skill: Provide CM for security-relevant information system software, hardware, and firmware
Skill: Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
Skill: Develop system security policy and ensures compliance
Skill: Administer the user identification and authentication mechanism of the Information System (IS)
Skill: Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
Skill: Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information

Provides support for a program, organization, system, or enclave's information assurance program.  Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.  Maintains operational security posture for an information system or program to ensure information systems security policies, standards and procedures are established and followed.  Assists with the management of security aspects of the information system and perform day-to-day security operations of the system.  Evaluate security solutions to ensure they meet security requirements for processing classified information.  Performs vulnerability/risk assessment analysis to support certification and accreditation.  Provides configuration management (CM) for information system security software, hardware, and firmware.  Manages changes to system and assess the security impact of those changes.   Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).  
Please learn more about us at http://www.onyxpoint.com
Powered by