Information System Security Officer

Fort Novosel, AL

Applications have closed

Agile Defense

At the forefront of innovation, driving advanced capabilities and solutions tailored to the most critical national security and civilian missions. 

View all jobs at Agile Defense

Requisition #: 483Job Title: Information System Security OfficerLocation: Fort NovoselFort Novosel, Alabama36362Clearance Level: Active DoD - SecretRequired Certification(s): ·       MA/MS or BA/BS in relevant field.·       IAM ISUMMARYThe United States Army Training and Doctrine Command (TRADOC) is a major command of the Unites States Army headquartered at Fort Eustis, Virginia. It is charged with overseeing the training of Army forces and the development of operational doctrine. TRADOC recruits, trains, educates, develops, and builds the Army, establishes standards, drives improvement, and leads change to ensure the Army can deter, fight, and win on any battlefield now and into the future. This TRADOC Cloud & Ancillary Support Services (TCASS) contract includes objectives and tasks for cloud migration planning services to include: Inventory (Users, Applications, Infrastructure, Security & Privacy, Services Management); Application Mapping and Assessment; Migration Planning, Migration Services, and Cloud Support ServiceAs part of TCASS, Agile Defense provides information system security support services to the United States Army Aviation Center of Excellence (AVNCOE). This position provides on-site support at Fort Novosel, Alabama, to the cybersecurity team supporting AVNCOE.

JOB DUTIES AND RESPONSIBILITIES·       Effect continuous coordination with the organizational cybersecurity personnel for which the systems are demonstrated, tested, or fielded.·       Meet the training and certification requirements of DA Pam 25–2–6 for IAM I, IAM II, or IAM III, if also working as the ISSM for the organization. The category and level depend on the functions performed, per DOD 8570.01–M and on Feb 25 2025 Subject to 8140.·       Ensure the appropriate organizational operational security posture is maintained for the assigned Army IS.·       Maintain organizational situational awareness and initiate actions to improve or restore cybersecurity posture of assigned Army IS.·       Assist the ISSMs in meeting their duties and responsibilities and initiate protective measures for cybersecurity incidents.·       Implement and enforce assigned Army IS cybersecurity policies and procedures, as defined by cybersecurity-related documentation.·       Ensure users for Army ISs under the ISSO’s purview have the requisite security clearances and access authorization and are aware of their cybersecurity responsibilities before being granted access to those systems.·       In coordination with the ISSM, initiate protective or corrective measures when a cybersecurity incident or vulnerability is discovered or reported.·       Ensure Army IS cybersecurity-related documentation is current and accessible to properly authorized individuals.·       Ensure implementation of IAVM dissemination, reporting, and compliance procedures.·       Ensure users receive initial and annual cybersecurity awareness training.·       Prepare, distribute, and maintain plans, instructions, and SOPs concerning system security.·       Review and evaluate the effects on security of system changes, including interfaces with other ISs and documents all changes.·       Ensure that all ISs within their area of responsibility have received a current ATO.
QUALIFICATIONS Required Certifications·       MA/MS or BA/BS in relevant field.·       IAM IEducation, Background, and Years of Experience·       8+ years of relevant experience (with MA/MS). 10+ years experience (with BA/BS).
ADDITIONAL SKILLS & QUALIFICATIONS Required Skills·       Experience performing the full cycle of system Assessment and Accreditation (A&A) activities. ·       Excellent working knowledge of the National Institute of Technology (NIST) Risk Management Framework (RMF). ·       Solid technical background with strong understanding of network architectures and communications, operating systems, web platforms, and databases.·       Experience developing and maintaining system security documentation, including but not limited to System Security Plans, Security Assessment Reports, Contingency Plans, and Interconnection Security Agreements. ·       Experience developing and updating Plans of Actions and Milestones (POA&Ms) and overseeing efforts to rectify issues found as a result of security vulnerabilities and security controls analysis.Preferred Skills·       N/A 
WORKING CONDITIONS Environmental Conditions·       Contractor site with 0%-10% travel possible. Possible off-hours work to support releases and outages. General office environment. Work is generally sedentary in nature, but may require standing and walking for up to 10% of the time. The working environment is generally favorable. Lighting and temperature are adequate, and there are not hazardous or unpleasant conditions caused by noise, dust, etc. Work is generally performed within an office environment, with standard office equipment available.Strength Demands·       Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles.  Some occasional walking or standing may be required.   Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.Physical Requirements·       Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; See

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Agile Cloud Compliance DoD DoDD 8140 DoDD 8570 IAM NIST Privacy Risk management RMF Security assessment Security Assessment Report System Security Plan Vulnerabilities

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.