Logo
Jacobs

Information Systems Security Officer, Senior- TS/SCI

Jacobs, Warrenton, Virginia, United States, 22186


Welcome. You haven’t signed in yet so please select ‘I accept’ to start or access your Jacobs Career Application.Information Systems Security Officer - (CIS000237)Your Impact:The mission of the Lone Wolf Team is to support, operate, and maintain a DoD provided, integrated voice, video, and data global communications network that facilitates collaboration among senior leaders and key staff.As a Senior Information Systems Security Officer, you will serve as the subject matter expert with a focus on cybersecurity risk management and governance, including the integration of cyber disciplines, such as mission assurance and supply chain risk management. You will work closely with the Cybersecurity Manager, Information Systems Security Engineers, and Systems/Network Engineers to ensure approaches, constraints, and perspectives are fully recommended and considered in risk management and policy decisions. Analyze the development of strategy, policy, governance, and implementation guidance recommendations to more closely integrate cybersecurity disciplines to enable a holistic risk management approach.The Senior Information Systems Security Officer will also perform Risk Management Framework (RMF) Assessment and Authorization (A&A) responsibilities. Develop the documentation, validation, and accreditation processes necessary to assure systems meet security and privacy requirements. Evaluate test results, analyze risk, and develop security assessment documentation to support accreditation decisions. Create a risk mitigation strategy and ensure security configurations are maintained in accordance with DoD mandated policies. Interpret RMF guidance from Authorizing Officials for clients and provide information and input for the preparation of accreditation packages. Assess the applicability of emergent vulnerabilities to individual systems and technologies.Responsibilities:Lead the development and maintenance of information security policies, standards, and control procedures to enable compliance with RMF.Complete Security Authorization packages, to include System Security Plans, Security Assessment Reports, POA&M summaries and a Continuous Monitoring Plan/assessment schedule, and present executive briefing to senior management.Ensure security risk assessments are conducted as appropriate on any system upgrades, software/hardware changes, etc.Ensure security authorization boundaries are properly defined and captured in the system security plans, and that all interconnection agreements are in place and current.Ensure system security controls contain accurate implementation statements and assessments results, and that appropriate artifacts are completed to support findings provide hands-on assistance as appropriate.Ensure POA&Ms have appropriate milestones, accurate description of the weaknesses and remediation, estimated cost to completion and realistic due dates providing hands-on assistance to components as necessaryMaintain day-to-day security posture and continuous monitoring of all Information Systems.Review system vulnerability scans, verify implementation of DISA STIG’s, and ensure other security relevant information system configuration tasks are completed.Perform test/evaluation of required technical security controls including performing certification tests and periodic inspections of information systems.Develop and conduct test procedures for verification Assessment and Authorization (A&A), Risk Management Framework (RMF) safeguards to meet customer requirements based NIST publications.Assess changes to an IS by performing periodic self-inspections, tests, and reviews of the IS program to ensure that systems are operating as authorized/accredited and that conditions have not changed; ensure corrective actions are taken for identified findings and vulnerabilities.Here's What You'll Need:Active TS/SCI ClearanceBachelor's degree in a related field requiredMinimum of 8 years of directly related experienceMust meet DoD 8570.01-M IAT-II or IAM-I baseline certification requirements such as Security + or equivalent.Experience with Microsoft Office applications such as Excel, Word, and Outlook.Experience in development of technical documentation to include artifacts required to support Assessment & Authorization (A&A) under the Risk Management Framework.Experience with security configurations across multiple operating systems in various environments, to include Windows, Linux, UNIX, utilizing Active Directory/Group Policy.In-depth knowledge of Microsoft Windows OS (client and server); familiarity with Red Hat Enterprise Linux (RHEL) desired.Experience with eMASS, XACTA, ACAS/NESSUS, Trellix, and Splunk.Experience with risk managed downloads, IS sanitization and destruction, contaminations, incident response, virus scanning, privileged user access, and hardware/software configuration management.Experience with developing IT policy, guidance, or procedure documentation supporting cybersecurity accreditations.Experience with analyzing, assessing, or implementing NIST SP 800-53 security controls, CCIs, and associated assessment procedures.Experience with developing and presenting complex technical information for technical and non-technical audiences.Expert familiarity with RMF.Excellent written and communication skills.Preferred:Previous supervision and/or participation with cybersecurity Assessment and Authorizations.Ability to provide hands-on cyber security tool assistance as necessary.Familiarity with cybersecurity tool suite; ForeScout, Avanti, and HBSS

#J-18808-Ljbffr