Senior Information System Security Officer (ISSO)
Chantilly, VA
Cyber Defense Technologies
Overview: CDT is looking to add a Senior Information Systems Security Officer to provide advice and assistance to secure configuration and operations to the customer’s IT assets. Apply extensive knowledge and experience of a variety of information system security concepts, practices, and procedures. This will be onsite in Chantilly, VA.
Clearance: An active Top Secret/SCI clearance with CI Poly is required. Candidates who do not meet these clearance requirements will not be considered.
Qualifications:
Clearance: An active Top Secret/SCI clearance with CI Poly is required. Candidates who do not meet these clearance requirements will not be considered.
Qualifications:
- Master’s Degree and 5 years work experience, Bachelor’s Degree and 8 years of work experience or equivalent; Associates Degree and 12 years of work experience or equivalent
- Thorough understanding and application of network security principles, practices, and implementations.
- Working knowledge of cross-functional integration of information systems into a physical security environment.
- Working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
- Understanding of system methodologies including but not limited to client server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, LAN, switches, and routers.
- Familiarity with detecting and preventing computer security compromises in a networked environment.
- Working knowledge of configuration management; system maintenance; and integration testing.
- Proficient in the use of tools used to prevent and/or negate malicious code.
- Understanding of COTS tools that scan at the physical layer of all removable and fixed media types including but not limited to: (CDs, hard drives, thumb drives, Zip/Jazz, etc.).
- Ability to decipher and explain in clear language Intelligence Community Directive (ICD) 503.
- Ability to support forensics and evidentiary preservation.
- Ability to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data.
- Demonstrated ability to translate technical information and information technology jargon into plain English.
- Ability to apply a risk management philosophy when faced with security challenges and the ability to articulate the pro’s and con’s in a clear concise manner.
- Demonstrated proficiency with the following computer operating systems (e.g. Microsoft Windows, LINUX, UNIX, Mac OS, etc.).
- Analytical ability to decipher complex technical configuration management documents.
- Demonstrated proficiency with database maintenance.
- Strong ability to elicit, articulate, and document information in a well-organized manner.
- Demonstrated ability to work independent of close supervision.
- Demonstrated experience with Microsoft Office Suite.
- Working knowledge of all applicable IC, DoD policies, procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM).
- Excellent communication, interpersonal, and team-building skills to engender rapport with the military personnel, civilians, and other contractors at all levels.
- An ability to prioritize work to meet deadlines, and to manage the workflow of the ISSO team.
- Demonstrated ability to correlate audit results between various systems and/or users and notify the ISSM of any discrepancies.
- Expertise with configuration management; system maintenance; and integration testing.
- Ability to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data.
- Expert in the use of tools used to prevent and or negate malicious code.
- Expert in detecting and preventing computer security compromises in a networked environment.
- Expertise in forensics chain of custody and evidentiary preservation.
- Demonstrated proficiency in successfully guiding complex information systems through assessment and authorization control gates.
- Analytical abilities to decipher complex technical configuration management documents.
- Proficient in maintaining databases.
- Thorough working knowledge of all applicable IC, DoD policies, procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM).
- Demonstrated ability to work independent of close supervision.
- Expert ability to establish and maintain effective internal and external working relationships with government and contractor program managers, security professionals, and mission partners.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
0
0
0
Categories:
Compliance Jobs
Leadership Jobs
Tags: Clearance DoD Firewalls Forensics Linux Network security Risk management Top Secret TS/SCI UNIX Windows
Region:
North America
Country:
United States
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information System Security Officer jobsInformation Security Specialist jobsSenior Security Analyst jobsSenior Cloud Security Engineer jobsSenior Cybersecurity Engineer jobsSystems Engineer jobsSystems Administrator jobsSenior Information Security Analyst jobsInformation Security Manager jobsCyber Security Specialist jobsSenior Network Security Engineer jobsIT Security Analyst jobsChief Information Security Officer jobsIT Security Engineer jobsSecurity Consultant jobsInformation System Security Officer (ISSO) jobsSenior Information Security Engineer jobsSecurity Specialist jobsSenior Product Security Engineer jobsInformation Systems Security Engineer jobsSenior Cyber Security Engineer jobsCyber Threat Intelligence Analyst jobsCyber Security Architect jobsSenior Software Engineer jobsCybersecurity Specialist jobs
SaaS jobsEncryption jobsJava jobsTS/SCI jobsBash jobsThreat detection jobsTerraform jobsSplunk jobsTop Secret jobsSDLC jobsRMF jobsSOC 2 jobsIDS jobsSQL jobsIPS jobsMalware jobsActive Directory jobsFinance jobsDocker jobsForensics jobsCompTIA jobsITIL jobsGIAC jobsOWASP jobsIntrusion detection jobs
IT infrastructure jobsVPN jobsCRISC jobsAnsible jobsHIPAA jobsDoDD 8570 jobsTCP/IP jobsOSCP jobsClearance Required jobsData Analytics jobsCCSP jobsMITRE ATT&CK jobsZero Trust jobsSOAR jobsDNS jobsJira jobsNIST 800-53 jobsUNIX jobsBanking jobsEndpoint security jobsIndustrial jobsSOX jobsJavaScript jobsCISO jobsSAP jobs