Information Systems Security Officer Skill Level 3
Fort Meade, MD
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
Full Time Senior-level / Expert USD 160K - 210K
Prime Time Consulting
Prime Time Consulting provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government.
We are actively searching for Information Systems Security Officer Skill Level 3 , located in Maryland, to support our team. We have varying levels of this position, depending on years of experience and education.
Essential Job Duties
- Provide support for a program, organization, system, or enclave’s information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configuration management (CM) for information systems security SW, HW, and FW. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include SSPs, Risk Assessment Reports, C&A packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in compliance with NIST RMF.
The Level 3 Information System Security Officer shall possess the following capabilities:
- Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
- Assist with preparation and maintenance of documentation
- Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
- Assist with Configuration Management (CM) for information system security SW, HW, and FW
- Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
- Propose, coordinate, and implement information systems security policies, standards, and methodologies
- Develop and maintain documentation for Security Authorization in accordance with ODNI and DoD policies
- Provide CM for security-relevant information system SW, HW, and FW
- Ensure compliance with system security policy
- Evaluate security solutions to ensure they meet security requirements for processing classified information
- Maintain operational security posture for an information system or program
- Provide support to the ISSM for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave
- Develop and update the system security plan and other Cybersecurity documentation
- Assist with the management of security aspects of the information system and perform day-to- day security operations of the system
- Track and ensure appropriate user identification and authentication mechanism of the Information System
- Obtain system authorization for ISs under their purview
- Provide support for a program, organization, system, or enclave’s information assurance program
- Plan and coordinate implementation of IT security programs and policies
- Manage and control changes to the system assessing the security impact of those changes
- Provide daily oversight and direction to contractor ISSOs
- Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives
Required Qualifications
- 10 years of combined work-related experience in the fields of IT, cybersecurity or security authorization is required. Experience in several of the following areas is required: knowledge of current security tools, HW/SW security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
- Bachelor’s degree in Computer Science or a related field (e.g. General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems) is required.
- In lieu of a Bachelor’s degree, 4 additional years of work-related experience may be substituted.
Certifications Required:
- DoD 8570 compliance with IAM I is required.
Company Perks
- 200 hours of PTO annually
- 6% 401k Contribution
- Competitive Health Care Options
- Short Term/Long Term/Life Insurance
- Annual Training Budget
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, sex, age, national origin, disability, Veteran status, or any other category protected by federal, state, or local laws.
Tags: C Compliance Computer Science DoD DoDD 8570 Encryption Firewalls Forensics IAM Industrial Mathematics NIST PKI Risk assessment Risk Assessment Report RMF SRTM System Security Plan
Perks/benefits: 401(k) matching Career development Insurance
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.