Potawatomi Federal Solutions, LLC
Information Systems Security Officer (ISSO) Intermediate
Potawatomi Federal Solutions, LLC, Greendale, Wisconsin, United States, 53129
Information Systems Security Officer (ISSO) Intermediate
Information Systems Security Officer (ISSO) - IntermediateLocation: Fort Meade, MarylandEmployment Class: Full Time RegularSalary: $155K DOE annuallySecurity Clearance Requirement: TS/SCI Full Scope PolyPosition SummaryPotawatomi Training, LLC
(a federal government contractor) is seeking a qualified Information Systems Security Officer (ISSO) - Intermediate; this effort includes the application and employment of cybersecurity expertise to systems and projects, to ensure that the appropriate security features and safeguards are designed, integrated, and implemented by all information systems throughout the system development life cycle.• Maintain the appropriate operational security posture for assigned systems, programs, and/or enclaves.• Provide guidance and technical expertise on all matters that impact or effect the security of the information system.• Assist in the development and execution of an enterprise level continuous monitoring program to minimize security risks and ensure compliance with that program on a routine basis.• Developing, updating, and submitting the System Security Plan and other required documentation that make up the Security Authorization Package.• Conduct configuration management for security-relevant changes to software, hardware, and firmware.• Perform and deliver security impact analyses of changes to the system or its environment of operation.• Assess the effectiveness of system security controls on an ongoing basis to determine system security status.• Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments.• Provides configuration management for security-relevant information system software, hardware, and firmware.Education, Experience & KSA Requirements:EDUCATION:• A Bachelor's degree in Computer Science or related field; six (6) years' experience may be substituted in lieu of degree.EXPERIENCE & KSA REQUIREMENTS:• Six (6) years of related work experience in the field of security authorization; or four years of relevant experience with a Bachelor’s degree.• Working knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, SP800-53, etc.• Knowledge of commercial security tools and their uses.• Experience with hardware/software security implementations.• Knowledge of different communication protocols, encryption techniques/tools, and PKI and authorization services.• Familiarity with security incident management, experience collaborating with Incident Response
Teams, and able to provide viable recommendations for the resolution or computer security incidents and vulnerability compliance.• Experience creating and presenting documentation and management reports.Preferred:• Should have experience working with the XACTA IA Manager.• Should be highly analytical and effectively able to troubleshoot and prioritize needs, requirements, and other issues.• Should be committed to continuous learning and system development because of the constant developing nature of cyber-attacks.• Ability to quickly learn new concepts, data formats, and software.• Should be a self-motivated, independent, detail oriented, responsible team player, and exhibit exceptional relationship management skills.• Working knowledge of the security authorization processes and procedures• Familiarity with change management functions• Experience in several of the following areas is required: knowledge of current security tools, hardware/software security implementation, different communication protocols, and encryption techniques/tools• Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization servicesCERTIFICATION REQUIREMENTS:• Minimum requirement of IAM Level I Certification: CAP, Security+ CE, CND, Cloud+ GSLC or HCISSP (IAM Level II/III certifications accepted).CLEARANCE REQUIREMENTS:#ClearanceJobsPotawatomi Training, LLC is an equal opportunity employer and is committed to providing a workplace free from harassment and discrimination. We celebrate the unique differences of our employees because that is what drives curiosity, innovation, and the success of our business. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, gender identity or expression, age, marital status, veteran status, disability status, pregnancy, parental status, genetic information, political affiliation, or any other status protected by the laws or regulations in the locations where we operate. Accommodations are available for applicants with disabilities.Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
#J-18808-Ljbffr
Information Systems Security Officer (ISSO) - IntermediateLocation: Fort Meade, MarylandEmployment Class: Full Time RegularSalary: $155K DOE annuallySecurity Clearance Requirement: TS/SCI Full Scope PolyPosition SummaryPotawatomi Training, LLC
(a federal government contractor) is seeking a qualified Information Systems Security Officer (ISSO) - Intermediate; this effort includes the application and employment of cybersecurity expertise to systems and projects, to ensure that the appropriate security features and safeguards are designed, integrated, and implemented by all information systems throughout the system development life cycle.• Maintain the appropriate operational security posture for assigned systems, programs, and/or enclaves.• Provide guidance and technical expertise on all matters that impact or effect the security of the information system.• Assist in the development and execution of an enterprise level continuous monitoring program to minimize security risks and ensure compliance with that program on a routine basis.• Developing, updating, and submitting the System Security Plan and other required documentation that make up the Security Authorization Package.• Conduct configuration management for security-relevant changes to software, hardware, and firmware.• Perform and deliver security impact analyses of changes to the system or its environment of operation.• Assess the effectiveness of system security controls on an ongoing basis to determine system security status.• Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments.• Provides configuration management for security-relevant information system software, hardware, and firmware.Education, Experience & KSA Requirements:EDUCATION:• A Bachelor's degree in Computer Science or related field; six (6) years' experience may be substituted in lieu of degree.EXPERIENCE & KSA REQUIREMENTS:• Six (6) years of related work experience in the field of security authorization; or four years of relevant experience with a Bachelor’s degree.• Working knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, SP800-53, etc.• Knowledge of commercial security tools and their uses.• Experience with hardware/software security implementations.• Knowledge of different communication protocols, encryption techniques/tools, and PKI and authorization services.• Familiarity with security incident management, experience collaborating with Incident Response
Teams, and able to provide viable recommendations for the resolution or computer security incidents and vulnerability compliance.• Experience creating and presenting documentation and management reports.Preferred:• Should have experience working with the XACTA IA Manager.• Should be highly analytical and effectively able to troubleshoot and prioritize needs, requirements, and other issues.• Should be committed to continuous learning and system development because of the constant developing nature of cyber-attacks.• Ability to quickly learn new concepts, data formats, and software.• Should be a self-motivated, independent, detail oriented, responsible team player, and exhibit exceptional relationship management skills.• Working knowledge of the security authorization processes and procedures• Familiarity with change management functions• Experience in several of the following areas is required: knowledge of current security tools, hardware/software security implementation, different communication protocols, and encryption techniques/tools• Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization servicesCERTIFICATION REQUIREMENTS:• Minimum requirement of IAM Level I Certification: CAP, Security+ CE, CND, Cloud+ GSLC or HCISSP (IAM Level II/III certifications accepted).CLEARANCE REQUIREMENTS:#ClearanceJobsPotawatomi Training, LLC is an equal opportunity employer and is committed to providing a workplace free from harassment and discrimination. We celebrate the unique differences of our employees because that is what drives curiosity, innovation, and the success of our business. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, gender identity or expression, age, marital status, veteran status, disability status, pregnancy, parental status, genetic information, political affiliation, or any other status protected by the laws or regulations in the locations where we operate. Accommodations are available for applicants with disabilities.Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
#J-18808-Ljbffr