Potawatomi Federal Solutions
Information Systems Security Officer (Full Scope Poly)
Potawatomi Federal Solutions, Columbia, Maryland, United States, 21046
Information Systems Security Officer (ISSO) - (Full Scope Poly)
Location: Fort Meade, Maryland
Employment Class: Full Time Regular
FLSA Classification: Exempt - Salaried
Salary: $150K DOE annually
Security Clearance Requirement:
TS/SCI Full Scope Poly
Position Summary
Potawatomi Training, LLC
(a federal government contractor) is seeking a qualified Information Systems Security Officer (ISSO) - Intermediate; this effort includes the application and employment of cybersecurity expertise to systems and projects, to ensure that the appropriate security features and safeguards are designed, integrated, and implemented by all information systems throughout the system development life cycle.
Essential Duties & Responsibilities
Maintain the appropriate operational security posture for assigned systems, programs, and/or enclaves.
Provide guidance and technical expertise on all matters that impact or effect the security of the information system.
Assist in the development and execution of an enterprise level continuous monitoring program to minimize security risks and ensure compliance with that program on a routine basis.
Develop, update, and submit the System Security Plan and other required documentation that make up the Security Authorization Package.
Conduct configuration management for security-relevant changes to software, hardware, and firmware.
Perform and deliver security impact analyses of changes to the system or its environment of operation.
Assess the effectiveness of system security controls on an ongoing basis to determine system security status.
Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments.
Provide configuration management for security-relevant information system software, hardware, and firmware.
EDUCATION & EXPERIENCE REQUIREMENTS:
Bachelors Degree in Computer Science (or related field) and minimum of four (4) years of experience in the field of security authorization
-OR-
Six (6) years of related work experience in the field of security authorization required in lieu of bachelor’s degree
CERTIFICATION REQUIREMENTS:
Minimum requirement of IAM Level I Certification: CAP, Security+ CE, CND, Cloud+ GSLC or HCISSP (IAM Level II/III certifications accepted).
CLEARANCE REQUIREMENTS:
TS/SCI Full Scope Poly
KNOWLEDGE, SKILLS & ABILITIES REQUIREMENTS:
Working knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, SP800-53, etc.
Knowledge of commercial security tools and their uses.
Experience with hardware/software security implementations.
Knowledge of different communication protocols, encryption techniques/tools, and PKI and authorization services.
Familiarity with security incident management, experience collaborating with Incident Response Teams, and able to provide viable recommendations for the resolution or computer security incidents and vulnerability compliance.
Experience creating and presenting documentation and management reports.
Preferred: Should have experience working with the XACTA IA Manager.
Should be highly analytical and effectively able to troubleshoot and prioritize needs, requirements, and other issues.
Should be committed to continuous learning and system development because of the constant developing nature of cyber-attacks.
Ability to quickly learn new concepts, data formats, and software.
Should be a self-motivated, independent, detail oriented, responsible team player, and exhibit exceptional relationship management skills.
Working knowledge of the security authorization processes and procedures.
Familiarity with change management functions.
Experience in several of the following areas is required: knowledge of current security tools, hardware/software security implementation, different communication protocols, and encryption techniques/tools.
Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
Potawatomi Training, LLC is an equal opportunity employer and is committed to providing a workplace free from harassment and discrimination. We celebrate the unique differences of our employees because that is what drives curiosity, innovation, and the success of our business. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, gender identity or expression, age, marital status, veteran status, disability status, pregnancy, parental status, genetic information, political affiliation, or any other status protected by the laws or regulations in the locations where we operate. Accommodations are available for applicants with disabilities.
#J-18808-Ljbffr
Location: Fort Meade, Maryland
Employment Class: Full Time Regular
FLSA Classification: Exempt - Salaried
Salary: $150K DOE annually
Security Clearance Requirement:
TS/SCI Full Scope Poly
Position Summary
Potawatomi Training, LLC
(a federal government contractor) is seeking a qualified Information Systems Security Officer (ISSO) - Intermediate; this effort includes the application and employment of cybersecurity expertise to systems and projects, to ensure that the appropriate security features and safeguards are designed, integrated, and implemented by all information systems throughout the system development life cycle.
Essential Duties & Responsibilities
Maintain the appropriate operational security posture for assigned systems, programs, and/or enclaves.
Provide guidance and technical expertise on all matters that impact or effect the security of the information system.
Assist in the development and execution of an enterprise level continuous monitoring program to minimize security risks and ensure compliance with that program on a routine basis.
Develop, update, and submit the System Security Plan and other required documentation that make up the Security Authorization Package.
Conduct configuration management for security-relevant changes to software, hardware, and firmware.
Perform and deliver security impact analyses of changes to the system or its environment of operation.
Assess the effectiveness of system security controls on an ongoing basis to determine system security status.
Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments.
Provide configuration management for security-relevant information system software, hardware, and firmware.
EDUCATION & EXPERIENCE REQUIREMENTS:
Bachelors Degree in Computer Science (or related field) and minimum of four (4) years of experience in the field of security authorization
-OR-
Six (6) years of related work experience in the field of security authorization required in lieu of bachelor’s degree
CERTIFICATION REQUIREMENTS:
Minimum requirement of IAM Level I Certification: CAP, Security+ CE, CND, Cloud+ GSLC or HCISSP (IAM Level II/III certifications accepted).
CLEARANCE REQUIREMENTS:
TS/SCI Full Scope Poly
KNOWLEDGE, SKILLS & ABILITIES REQUIREMENTS:
Working knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, SP800-53, etc.
Knowledge of commercial security tools and their uses.
Experience with hardware/software security implementations.
Knowledge of different communication protocols, encryption techniques/tools, and PKI and authorization services.
Familiarity with security incident management, experience collaborating with Incident Response Teams, and able to provide viable recommendations for the resolution or computer security incidents and vulnerability compliance.
Experience creating and presenting documentation and management reports.
Preferred: Should have experience working with the XACTA IA Manager.
Should be highly analytical and effectively able to troubleshoot and prioritize needs, requirements, and other issues.
Should be committed to continuous learning and system development because of the constant developing nature of cyber-attacks.
Ability to quickly learn new concepts, data formats, and software.
Should be a self-motivated, independent, detail oriented, responsible team player, and exhibit exceptional relationship management skills.
Working knowledge of the security authorization processes and procedures.
Familiarity with change management functions.
Experience in several of the following areas is required: knowledge of current security tools, hardware/software security implementation, different communication protocols, and encryption techniques/tools.
Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
Potawatomi Training, LLC is an equal opportunity employer and is committed to providing a workplace free from harassment and discrimination. We celebrate the unique differences of our employees because that is what drives curiosity, innovation, and the success of our business. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, gender identity or expression, age, marital status, veteran status, disability status, pregnancy, parental status, genetic information, political affiliation, or any other status protected by the laws or regulations in the locations where we operate. Accommodations are available for applicants with disabilities.
#J-18808-Ljbffr