search
yourdomain > Fredericksburg > computer/technical > Information Systems Security Officer (ISSO) - Active TS Clearance Required

Information Systems Security Officer (ISSO) - Active TS Clearance Required

Report Ad  Whatsapp
Posted : Wednesday, April 24, 2024 07:53 PM

About the Organization Now is a great time to join Redhorse Corporation.
Redhorse specializes in developing and implementing creative strategies and solutions with private, state, and federal customers in the areas of cultural and environmental resources services, climate and energy change, information technology, and intelligence services.
We are hiring creative, motivated, and talented people with a passion for doing what's right, what's smart, and what works.
The Information Systems Security Officer (ISSO) will be responsible for the following: Apply current Information Assurance (IA) technologies to the architecture, design, development, evaluation, and integration of applications, systems, and networks to maintain system security.
Work closely with Government customers to ensure the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, Network/Hardware/Software certification and accreditation, IA Policies and procedures, and network IA/Security tools.
Advise Government on and use methods such as encryption technology, vulnerability analysis, and security management standards to protect government customer systems and applications.
Prepare documentation such as System Security Plans (SSP), Security Assessment Reports (SAR), and Plan of Action and Milestones (POA&Ms) to ensure compliance with Government security policies, procedures, and requirements.
Assess the performance of IA security controls within the IT infrastructure.
Identify IA vulnerabilities resulting from a departure from approved procedures and plans and take appropriate corrective, mitigation, and recovery actions.
Perform system audits to assess security related factors within the IT infrastructure.
Review response actions to security incidents.
Maintain a repository for all system accreditation/certification documentation.
Assist with analysis of Customer/End User requirements for information technology networks, hardware and software applications and creates the certification and accreditation package for the appropriate Authorizing Official Prepare Certification and Accreditation (C&A) documentation, using multiple standards such as Department of Defense (DoD) Information Technology Security Certification and Accreditation Process (DITSCAP), National Information Assurance Certification and Accreditation Process (NIACAP), Director of Central Intelligence Directive 6/3 (DCID 6/3), Common Criteria, and National Institute of Standards and Technology (NIST) 800-50, to achieve accreditation of supported systems.
Represent program security interests at Government/customer meetings.
Basic Requirements for Skills, Experience, Education and Credentials Experience as an Information System Security Officer, ISSE, or ISSM evaluating system, network and infrastructure security controls against requirements such as Federal Information Security Management Act (FISMA), NIST, or similar guidelines.
Capable of independently completing all required system accreditation paperwork to obtain an Authority to Operate, Authority to Connect (ATC) or Interim Authority to Test (IATT) and/or maintain above authorities.
Technical capability to define, configure, and execute vulnerability and compliance policy in accordance with enterprise security requirements.
Mastery of the Risk Management Framework (RFM) process.
A strong working knowledge of IA security controls, security technical implementation guides (STIGS) requirements.
Demonstrate effective written and verbal communication skills in presentations and reporting of systems to security leadership.
Knowledge of operating systems and network to aid implementation of information security and assurance principles.
Ability to assess current and evolving security threats in an operational environment.
Bachelor's Degree in Computer Security, Computer Science, Computer Engineering, Information Technology, Cybersecurity, or related field of study; or with government customer approval in lieu of college level education (High School/GED graduate), eight (8) or more years of specialized experience.
Active Top Secret Clearance is required.
Equal Opportunity Employer/Veterans/Disabled Accommodations: If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation if you are unable or limited in your ability to access job openings or apply for a job on this site as a result of your disability.
You can request reasonable accommodations by contacting Talent Acquisition at Talent_Acquisition@redhorsecorp.
com Redhorse Corporation shall, in its discretion, modify or adjust the position to meet Redhorse’s changing needs.
This job description is not a contract and may be adjusted as deemed appropriate in Redhorse’s sole discretion.

• Phone : NA

• Location : Quantico, VA

• Post ID: 9083924507


Related Ads (See all)


auburn.yourdomain.com is an interactive computer service that enables access by multiple users and should not be treated as the publisher or speaker of any information provided by another information content provider. © 2024 yourdomain.com