Enable job alerts via email!
Boost your interview chances
Create a job specific, tailored resume for higher success rate.
An established industry player is seeking a skilled Information Systems Security Officer (ISSO) to enhance their security posture. This role involves supporting the implementation and enforcement of security policies, conducting vulnerability assessments, and managing day-to-day security operations. The ideal candidate will have substantial experience in security tools and practices, along with a solid educational background in Computer Science. This is a fantastic opportunity to contribute to critical security initiatives within a dynamic environment, ensuring compliance with national standards and protecting sensitive information.
(U) Provides support for a program, organization,
system, or enclave’s information assurance
program. Provides support for proposing,
coordinating, implementing, and enforcing
information systems security policies, standards,
and methodologies. Maintains operational
security posture for an information system or
program to ensure information systems security
policies, standards, and procedures are
established and followed. Assists with the
management of security aspects of the
information system and performs day-to-day
security operations of the system. Evaluate
security solutions to ensure they meet security
requirements for processing classified
information. Performs vulnerability/risk
assessment analysis to support certification and
accreditation. Provides configuration
management (CM) for information system
security software, hardware, and firmware.
Manages changes to system and assesses the
security impact of those changes. Prepares and
reviews documentation to include System
Security Plans (SSPs), Risk Assessment Reports,
Certification and Accreditation (C&A) packages,
and System Requirements Traceability Matrices
(SRTMs). Supports security authorization
activities in compliance with National Institute of
Standards and Technology Risk Management
Framework (NIST RMF).
REQUIREMENTS:
QUALIFICATIONS:
LEVEL1:
(U) Five (5) years experience as an ISSO on programs and contracts of similar scope, type, and
complexity is required. Experience is to include at least one (1) of the following areas: knowledge of
current security tools, hardware/software security implementation; communication protocols; and
encryption techniques/tools. Bachelor’s degree in Computer Science or related discipline from an
accredited college or university is required. DoD 8570 compliance with IAT Level I or higher is
required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor’s degree.
LEVEL2:
(U) Ten (10) years experience as an ISSO on programs and contracts of similar scope, type, and
complexity is required. Experience is to include at least two (2) of the following areas: knowledge of
current security tools, hardware/software security implementation; communication protocols; and
encryption techniques/tools. Bachelor’s degree in Computer Science or related discipline from an
accredited college or university is required. DoD 8570 compliance with Information Assurance
Management (IAM) Level I or higher is required. Four (4) years of additional experience as an ISSO
may be substituted for a bachelor’s degree.