Cyber Defense Technologies
Senior Information System Security Officer (ISSO)
Cyber Defense Technologies, Chantilly, VA, United States
Overview : CDT is looking to add a Senior Information Systems Security Officer to provide advice and assistance to secure configuration and operations to the customer's IT assets. A pply extensive knowledge and experience of a variety of information system security concepts, practices, and procedures. This will be onsite in Chantilly, VA.
Clearance : An active Top Secret/SCI clearance with CI Poly is required. Candidates who do not meet these clearance requirements will not be considered.
Qualifications:
Clearance : An active Top Secret/SCI clearance with CI Poly is required. Candidates who do not meet these clearance requirements will not be considered.
Qualifications:
- Master's Degree and 5 years work experience, Bachelor's Degree and 8 years of work experience or equivalent; Associates Degree and 12 years of work experience or equivalent
- Thorough understanding and application of network security principles, practices, and implementations.
- Working knowledge of cross-functional integration of information systems into a physical security environment.
- Working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
- Understanding of system methodologies including but not limited to client server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, LAN, switches, and routers.
- Familiarity with detecting and preventing computer security compromises in a networked environment.
- Working knowledge of configuration management; system maintenance; and integration testing.
- Proficient in the use of tools used to prevent and/or negate malicious code.
- Understanding of COTS tools that scan at the physical layer of all removable and fixed media types including but not limited to: (CDs, hard drives, thumb drives, Zip/Jazz, etc.).
- Ability to decipher and explain in clear language Intelligence Community Directive (ICD) 503.
- Ability to support forensics and evidentiary preservation.
- Ability to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data.
- Demonstrated ability to translate technical information and information technology jargon into plain English.
- Ability to apply a risk management philosophy when faced with security challenges and the ability to articulate the pro's and con's in a clear concise manner.
- Demonstrated proficiency with the following computer operating systems (e.g. Microsoft Windows, LINUX, UNIX, Mac OS, etc.).
- Analytical ability to decipher complex technical configuration management documents.
- Demonstrated proficiency with database maintenance.
- Strong ability to elicit, articulate, and document information in a well-organized manner.
- Demonstrated ability to work independent of close supervision.
- Demonstrated experience with Microsoft Office Suite.
- Working knowledge of all applicable IC, DoD policies, procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM).
- Excellent communication, interpersonal, and team-building skills to engender rapport with the military personnel, civilians, and other contractors at all levels.
- An ability to prioritize work to meet deadlines, and to manage the workflow of the ISSO team.
- Demonstrated ability to correlate audit results between various systems and/or users and notify the ISSM of any discrepancies.
- Expertise with configuration management; system maintenance; and integration testing.
- Ability to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data.
- Expert in the use of tools used to prevent and or negate malicious code.
- Expert in detecting and preventing computer security compromises in a networked environment.
- Expertise in forensics chain of custody and evidentiary preservation.
- Demonstrated proficiency in successfully guiding complex information systems through assessment and authorization control gates.
- Analytical abilities to decipher complex technical configuration management documents.
- Proficient in maintaining databases.
- Thorough working knowledge of all applicable IC, DoD policies, procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM).
- Demonstrated ability to work independent of close supervision.
- Expert ability to establish and maintain effective internal and external working relationships with government and contractor program managers, security professionals, and mission partners.