Logo
John Galt Staffing

Information System Security Officer (ISSO)

John Galt Staffing, Colorado Springs, Colorado, United States, 80509


**Active DOD Top Secret Clearance Required***The Integrated Missile Defense Technology Group supports the Missile Defense Agency (MDA) in the development, deployment, testing, and enhancement of the Ballistic Missile Defense System. Performs detailed system and component engineering, flight and ground test analysis, and advanced capability development in collaboration with the contractors and government program offices that are building the missile defense elements and components. Group is in need of an Information System Security Officer (ISSO) Specialist to support the special MDA requirements of multiple projects with local and remote locations.Seeks an ISSO Specialist with DoD/MDA Information Security experience who will maintain classified systems under a Risk Management Framework (RMF) that support Missile Defense analysis activities. The specialist will serve as the ISSO for distributed systems shared by Laboratory groups, including providing information assurance engineering support, certification / accreditation audits and monitoring, user administration support, security documentation, information security incident investigation, and IT/IA system and process life cycle engineering support. The specialist will be responsible to coordinate with multiple organizational security groups.Job Description:This role is supporting Air Force Programs and prefers candidates with mid-senior level experience:* Assist and Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).* Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.* Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.* Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.* Track audit findings and recommendations to ensure that appropriate mitigation actions are taken.* Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements.* Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to key stake holders. Recognize a possible security violation and take appropriate action to report the incident, as required.* Assist the Program Managers and the Information System Security Manager (ISSM) in the development and maintenance of System Security Plans (SSP) and associated artifacts such as the Plan of Action & Milestones (POA&M), Risk Assessment Report, and Continuous Monitoring Strategy.* Ensure systems are operated, maintained, and disposed of in accordance with organization security policies and procedures.* Conduct network, system, and application vulnerability scanning, configuration assessment, and remediation.* Lead and align information technology (IT) security priorities with the security strategy.* Prepare for and participate in periodic organization compliance assessments. Interpret patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program.