Information Systems Security Officer Skill Level 3

Fort Meade, MD

⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️

Apply now Apply later

Prime Time Consulting provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government. 

We are actively searching for Information Systems Security Officer Skill Level 3 , located in Maryland, to support our team. We have varying levels of this position, depending on years of experience and education.


Essential Job Duties

  •  Provide support for a program, organization, system, or enclave’s information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configuration management (CM) for information systems security SW, HW, and FW. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include SSPs, Risk Assessment Reports, C&A packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with NIST RMF.

The Level 3 Information System Security Officer shall possess the following capabilities:

  • Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
  • Assist with preparation and maintenance of documentation
  • Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
  • Assist with Configuration Management (CM) for information system security SW, HW, and FW
  • Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
  • Propose, coordinate, and implement information systems security policies, standards, and methodologies
  • Develop and maintain documentation for Security Authorization in accordance with ODNI and DoD policies
  • Provide CM for security-relevant information system SW, HW, and FW
  • Ensure compliance with system security policy
  • Evaluate security solutions to ensure they meet security requirements for processing classified information
  • Maintain operational security posture for an information system or program
  • Provide support to the ISSM for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave
  • Develop and update the system security plan and other Cybersecurity documentation
  • Assist with the management of security aspects of the information system and perform day-to- day security operations of the system
  • Track and ensure appropriate user identification and authentication mechanism of the Information System
  • Obtain system authorization for ISs under their purview
  • Provide support for a program, organization, system, or enclave’s information assurance program
  • Plan and coordinate implementation of IT security programs and policies
  • Manage and control changes to the system assessing the security impact of those changes
  • Provide daily oversight and direction to contractor ISSOs
  • Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives

Required Qualifications

  • 10 years of combined work-related experience in the fields of IT, cybersecurity or security authorization is required. Experience in several of the following areas is required: knowledge of current security tools, HW/SW security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
  • Bachelor’s degree in Computer Science or a related field (e.g. General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems) is required.
  • In lieu of a Bachelor’s degree, 4 additional years of work-related experience may be substituted.

Certifications Required: 

  • DoD 8570 compliance with IAM I is required.

Company Perks

  • 200 hours of PTO annually
  • 6% 401k Contribution
  • Competitive Health Care Options
  • Short Term/Long Term/Life Insurance
  • Annual Training Budget

We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, sex, age, national origin, disability, Veteran status, or any other category protected by federal, state, or local laws.

Apply now Apply later
Job stats:  0  0  0

Tags: C Compliance Computer Science DoD DoDD 8570 Encryption Firewalls Forensics IAM Industrial Mathematics NIST PKI Risk assessment Risk Assessment Report RMF SRTM System Security Plan

Perks/benefits: 401(k) matching Career development Insurance

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.