Information System Security Officer (ISSO) (TS/SCI with Poly Required)

Tysons Corner, Virginia, United States

Applications have closed

GCI

Founded in 1989, GCI is a premier Engineering and Analytics firm with a steadfast commitment to national security and intelligence. Specializing in Data Analytics, Software Development, Engineering,

View all jobs at GCI

GCI, embodies excellence, integrity and professionalism. The employees supporting our customers deliver unique, high-value mission solutions while effectively leverage the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data Analytics and Software Development, Engineering, Targeting and Analysis, Operations, Training, and Cyber Operations. We maximize opportunities for success by building and maintaining trusted and reliable partnerships with our customers and industry.

At GCI, we solve the hard problems. As a Information System Security Officer (ISSO), a typical day will include the following duties:

JOB DESCRIPTION

Members of the ISSO team support the assessment and authorization (A&A) process for information systems. The successful candidate will have requisite cyber security experience with methods and tools used to improve the security posture of critical systems such as identifying risks, vulnerabilities, anomalies, patching, auditing, automation, security hardening, best practices, and evaluating system changes. In addition, the candidate will collaborate with developers and engineers on projects to create a secure hybrid-cloud environment.

 

QUALIFICATIONS

  • Bachelor’s degree in Cybersecurity, IT, or other related technical discipline
  • Minimum eight (8) years applied experience or relevant degree plus 5 years of Cybersecurity expertise with demonstrated ability to successfully shepherd IT projects of varying types through the authorization lifecycle

 

REQUIRED KNOWLEDGE/SKILLS

  • Strong verbal and written communication/cooperation within a team context
  • Supported control implementation assessment and reporting and monitoring processes using cyber security and assessment management systems
  • Understanding of perimeter controls (firewalls), access control mechanisms, and network architectures
  • Demonstrated essential understanding of methods for hardening operating systems (e.g., CentOS, RedHat, Windows)
  • Skilled with and/or demonstrated technical aptitude with vulnerability and risk assessment tools such as Elasticsearch or Splunk SIEMs, Rapid7 Nexpose, and IDS/IPS monitoring and alerting
  • Strong understanding of methodologies for researching and documenting software and hardware vulnerabilities
  • Experienced working closely with stakeholders, developers, and external teams, including customer security manages (ISSMs), organizational leadership, and key personnel
  • Applied experience with the customer’s assessment and authorization tracking tools
  • Knowledgeable regarding Common Control Provider (CCP) requirements and methodology
  • Demonstrated knowledge and experience with networking topologies and hardware, including commonly used/referenced network devices, IDS and IPS, etc.
  • Applied experience with open-source and commercial tools and systems such as nmap, Nessus, Rapid7, Splunk, Nipper, Elasticsearch, Jira, Confluence, Cisco, VMware, Citrix, or Trellix, as well as GOTS tools used by the customer
  • Demonstrated experience with the design and implementation of defense-in-depth solutions
  • Skilled in cross-team collaboration and effective communication to fulfill specific authorization requirements
  • Demonstrated skill documenting processes and procedures in CONOPS and system security, contingency, configuration management and other plans
  • Demonstrated ability to facilitate customer concurrences required for risk-based decisions, especially those requiring waivers
  • Experience assisting the customer with decisions impacting the security posture and compliance of their systems and networks with requirement as documented in NIST 800-53 and its revisions
  • Extensive familiarity with communications protocols, such as TCP/IP, UDP, HTTP/S, SSH, LDAP, etc.
  • Demonstrated experience with security, monitoring and auditing cloud-based technologies, products and services, such as Amazon Web Services (AWS) or Microsoft Azure
  • Knowledge of the customer's organization, their network systems and infrastructure, processes and procedures, and request and approval tools
  • Ability to work within fast-paced customer environments

 

DESIRED SKILLS

  • Experience in scripting/program languages such as Bash, PowerShell, or Python

 

 

*A candidate must be a US Citizen and requires an active/current TS/SCI with Polygraph clearance.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: Analytics Audits Automation AWS Azure Bash Citrix Clearance Cloud Compliance Confluence ConOps Data Analytics Elasticsearch Firewalls IDS IPS Jira LDAP Monitoring Nessus NIST NIST 800-53 Nmap Polygraph PowerShell Python Risk assessment Scripting SIEM Splunk SSH TCP/IP TS/SCI VMware Vulnerabilities Windows

Regions: Africa North America
Country: United States

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.