Information Systems Security Officer

Alexandria, Virginia, US

Institute for Defense Analyses

View all jobs at Institute for Defense Analyses

Apply now Apply later

We support transparency, equity, and fairness in our compensation program and provide a reasonable estimate of the salary range based on data-driven market analysis for each position. While it is not typical for an individual to be hired at or near the top of the range, a reasonable estimate of the salary range for this role is $85,439-$136,677.  Individual salary within this range will be commensurate with the incumbent’s experience, unique skills and qualifications, and other relevant factors.

Summary Statement: 

Serves as Information Systems Security Officer (ISSO). Works closely with the Information System Security Manager (ISSM) to support the daily operations of the information security program.  Ensures appropriate operational security posture is maintained for local area networks (LAN), wide area networks (WAN) and multi-user stand-alone systems (MUSA).  The ISSO monitors these systems and their operational environment and must have the technical knowledge and expertise required to manage the security aspects of these systems.

 Must understand requirements for physical and environmental protection of the computer systems, personnel security rules that pertain to systems, incident handling (such as classified spills or malware), and security training and awareness. The ISSO plays an active role in monitoring a system and its environment of operation to include developing and updating the system security plan (SSP), managing and controlling changes to the system, and assessing the security impact of those changes.

Primary Responsibilities:

  • Serves as the Information Systems Security Officer (ISSO) under the Information Systems Security Manager (ISSM) Team Lead for IDA classified and unclassified systems.
  • Manages and coordinates information security monitoring, inspections and incident response.
  • Manages a formal information security / information systems security program with assistance from the ISSM Team Lead.
  • Reviews and maintains information systems security plans (SSPs) and Assessment and Authorization (A&A) in accordance with DoD mandated polices.
  • Performs audit reviews of systems comprised of multiple operating system using security information and event management (SIEM) products to track multiple events including any signs of inappropriate or unusual activity, intrusion events, data transfers, etc.  Reports any findings to the ISSM.
  • Performs recurring self-assessments on all systems under their purview to ensure compliance with documented security requirements and to detect any system level vulnerabilities. Prepares a detailed report of the findings and ensures proper protection and / or corrective measures are taken immediately or develops a Plan of Action and Milestones (POA&M) to document planned actions.
  • Supports the ISSM during on-site assessments of US Government Security Control Assessors (SCAs) to demonstrate compliance with technical configuration requirements and implementation and enforcement of written security policy.
  • Continuously updates all required system documentation, including the SSP, POA&M, Risk Assessment Report, and system component inventories.
  • Develops procedures for responding to security incidents and investigating and reporting security violations and incidents as appropriate.
  • Reviews and approves software installed on classified systems under their purview.
  • Develops and organizes annual Classified Incident Response table top exercises with ISSM Team Lead.
  • Develops, implements and enforces information security policies and procedures.
  • Assists ISSM Team Lead to perform the steps involved in the execution of the Risk Management Framework (RMF), including generation of documentation, controls compliance testing, and continuous monitoring activities for systems.
  • Develops and periodically reviews training materials and standard operating procedures covering all technical and administrative aspects of system operations.
  • Works with IT to perform an initial system assessment to ensure that required security controls are implemented and operating correctly before a system is authorized for production.
  • Works with IT to develop automated processes to assist in maintaining system compliance and documentation updates.
  • Collaborates with IT to oversee an effective change management policy and procedures for authorizing use of hardware / software on an information system.  Evaluates proposed changes against Government security requirements and recommends approval or denial based on a security impact analysis.
  • Reviews and ensures implementation of bulletins and advisories that impact the security posture of information systems covered by SSPs.
  • Reviews systems for compliance to Government requirements and provide recommendations for improvements.
  • Develops an information systems security, education, training, and awareness program.
  • Clearly communicates to all users including security personnel, IT staff, and managers the proper procedures for protecting classified information and the systems that process that information. Training prior to initial system access and periodically after includes proper system usage, physical security, data transfers, media protection etc.
  • Performs other duties as assigned.

 Minimum Qualifications:

  • Bachelor’s degree in Information Assurance/Cyber Security or similar relevant field or equivalent experience.
  • Minimum three years’ experience in a similar systems security manager or officer role.
  • Must have the following Information Assurance certifications or security training or obtain the certificates within 6 months of hire: 
  • DSS NISPOM Risk Management Framework Courses
  • DOD 8570.01-M or DoD8140 certification at IAT level 2, such as Security +
  • Governance, Risk and Compliance Certification (CGRC) through (ISC)2
  • Higher-level certifications such as CISM or CISSP strongly desired.
  • Must understand the technical configurations of Windows or Linux Operating Systems (as appropriate to location) in physical and virtual environments; both preferred.
  • Knowledge of NIST security publications is highly preferred.
  • Must have the ability to read and understand event logs from Windows and/or Linux.
  • Knowledge of tools to parse logs, scan operating systems for vulnerabilities and compliance checking preferred, and required within 6 months of hire.
  • Customer service skills, including good interpersonal skills and the ability to communicate effectively with all levels of employees.
  • This position requires an Active Secret or TS/SCI to be considered. 

Apply now Apply later
  • Share this job via
  • 𝕏
  • or
Job stats:  2  0  0

Tags: CGRC CISM CISSP Compliance DoD DoDD 8570 Governance Incident response Linux Malware Monitoring NISPOM NIST POA&M Risk assessment Risk Assessment Report Risk management RMF Security Impact Analysis SIEM System Security Plan TS/SCI Vulnerabilities Windows

Perks/benefits: Equity / stock options Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.