Information Systems Security Officer (ISSO) - Senior
5520 Tech Center Drive Suite 104
Full Time Senior-level / Expert Clearance required USD 57K - 134K *
Axient
Axient advances defense and civilian missions from aerospace to cyberspace with advanced technologies.Check out this NEW Opportunity with Axient!
Axient is currently seeking a Senior Information Systems Security Officer (ISSO) to support our customer in Colorado Springs, CO, 80919. This requires an active TS/SCI clearance.
What you will do...
Will work with Information Systems Security Manager (ISSM) to create and maintain Assessment and Authorization (A&A) documentation, including the system security plan, security control assessment, plan of action and milestones to support Authorization to Operate decisions. Capture and refine information security requirement for new systems or for enhanced functionality on existing systems. Provide support for proposing, coordinating, implementing and enforcing information systems security policies, standards and methodologies. Your talents, perspectives, and efforts will contribute directly to the safeguarding of valuable intelligence systems and data, ensuring positive mission outcomes. This position is located in Colorado Springs, Colorado and requires level of effort across multiple domains and security levels.
Support Space Systems Command (SSC), Space Sensing Tools Application & Processing (TAP) Lab in Boulder, CO and integration support to the Overhead Persistent Infrared (OPIR) Battlespace Awareness Center (OBAC) at Buckley SFB, Aurora, Colorado.
Duties to include, but are not limited to:
- Ensuring the cybersecurity architecture and design of the customer’s systems are functional and secure with the ability to identify, protect, detect, respond and recover from cyber-attack
- Developing and sustaining enterprise RMF accreditation packages, from concept development and contract pre-acquisition through contractor design and accreditation
- Experience in Developing and Sustaining Cloud environments from concept development and contract pre-acquisition through contractor design and accreditation
- Providing Information System Security Operations support, integration services, technical assessments, and solutions to enable cybersecurity and DCO
- Applies a combination of expert engineering knowledge of security solutions to design, develop and/or implement solutions to ensure they are consistent with enterprise architecture security policies and support full spectrum military cyberspace operations
- Overseeing system and network designs that encompass multiple computer and network devices to include those with differing data protections/classification requirements
- Developing Defensive Cyberspace Operations and incident Response Tactics, Techniques and Procedures to monitor and protect the system from cyber-attacks
- Apply Secure Technical Implementation Guide (STIG) best practices to classified and unclassified information systems, networking equipment, and applicable software/applications
- Information Security interface to government customer and approving authorities across the DoD and Intelligence Communities
- Perform vulnerability/risk assessment analysis to support authorization and accreditation
- Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Authorization To Operate (ATO) packages, policies and Security Controls Traceability Matrices (SCTMs)
- Conduct periodic reviews and evaluations of required IS policies and procedures
- Support IS Security Inspections, tests, and reviews
Skills you will need...
Minimum Requirements:
- Education: Master’s degree in engineering or related technical field (Required). Equivalent combination of education and experience may be substituted for degree requirement. Education equivalent per contract: 12 years work experience may be substituted for a Master's Degree; OR Bachelor's Degree plus 8 years work experience may be substituted for a Master's Degree.
- Experience: 10+ years of experience working Information Systems Security Manager (ISSM) and creating and maintain Assessment and Authorization (A&A) documentation, including the system security plan, security control assessment, plan of action and milestones to support Authorization to Operate decisions. (Required)
- Valid Security+ CE Certification. Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technical Level 2. (Required)
- Cloud design and security experience. Highly Desired.
- Cyber Workforce Management Program (DoDD 8140.01 & DoD 8570.01-m) Information Assurance Management (IAM) Level II certified. Highly Desired
- Demonstrated understanding of Cybersecurity Service Provider (CSSP) and DCO operations and tools. Desired
- Familiarity with Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) and system configuration validation and verification against documented security requirements. Desired
- Familiarity with cloud-based systems, operating systems, databases, networking, firewalls, Network Intrusion Detection and Prevention Systems (IDS/IPS) and host-based IDS and IPS. Desired
- Familiarity with Program Security responsibilities to include but not limited to: OPSEC, Program. Protection, Personnel Security clearances, Security Training and Education, Classification management. Desired
Security Clearance: Active Secret eligible to Top Secret with SCI eligibility
#CJ
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Clearance Cloud DCO DISA DoD DoDD 8140 DoDD 8570 Firewalls IAM IDS Incident response Intrusion detection IPS POA&M Risk assessment Risk Assessment Report RMF SCTM Security Clearance STIGs System Security Plan Top Secret TS/SCI
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.