Kina'ole Foundation
ISSO / Site Lead - Top Secret/SCI
Kina'ole Foundation, Wahiawa, Hawaii, United States, 96786
Ho'olaulima Government Solutions LLC (HGS) is a Small Business Administration-certified, Native Hawaiian Organization-Owned, 8(a) Small Business that provides services and solutions in the areas of Environmental Services, Information Technology Services, Healthcare Services and Professional and Technical Services to the Department of Defense and other Federal agencies.
HGS is a wholly-owned subsidiary of the Kina'ole Foundation, a 501(c)(3) non-profit established to benefit Native Hawaiian communities.
You will receive a comprehensive benefits package that includes:
Health insurance
Dental insurance
Life insurance
401K
Disability insurance
...and much, much more!
Job Description : The ISSO shall support the implementation and sustainment of the command cybersecurity program within NCTAMS PAC and its four subordinate commands/detachments by performing the following:
Utilize cybersecurity tools, procedures, and practices as prescribed by the Government.
Review and make recommendations to the NCTAMS PAC cybersecurity program regarding policies and ensure procedures are implemented and functioning in accordance with DoD and DoN cybersecurity policies. Reviews shall include, but not be limited to, the policy and procedures centered around the protection of classification categories of information including Sensitive but Unclassified, Secret, Top Secret, and Top Secret SCI. Quarterly, the contractor shall generate a summary report documenting all findings and recommended changes to the Contracting Officer Representative (COR)/Information Systems Security Manager (ISSM).
Perform an annual Quality Assurance Inspection of the commands approximate 20-25 Cybersecurity Standard Operating Procedures (SOPS) and Instructions to ensure compliance with cybersecurity policies and procedures. The contractor shall generate a QA Inspection summary report documenting all report findings and recommended changes to the COR/ISSM.
Coordinate with NCTAMS PAC Plans and Programs Department, Operations Department and Systems Program of Record for compliance review of all NCTAMS PAC system installs, modifications, and de-installations; review accreditation documentation, system cybersecurity policies and procedures, compliance services and Fleet Readiness Certification Board (FRCB) documentation. Attend monthly command Configuration Control Board (CCB) meetings. Identified Cybersecurity gaps shall be reported to the command ISSM via email within five business days after discovery.
Participate in the collection of evidence as required and directed by Navy Cyber Defensive Operations Command (NCDOC). Participate in the preservation of evidence by maintaining the chain of custody in accordance with OPNAV 5527/22 form. Submit Electronic Spillage Action Forms, after review by the Information System Security Manager (ISSM), to N00SM Security Manager and the Electronic Spillage Center distro via email within one business day of spillage report.
Review System Authorization Access Request - Navy (SAAR-N) and Privileged Access Agreement (PAA) forms within Total Workforce Management Services (TWMS) to support the issuance and management of user accounts and two-factor tokens by acting as the Trusted Agent. Respond to token requests within 3 business days by submitting requests for digital certificates to the Local Registration Authority (LRA). SAAR-N's and PAA's shall be reviewed and routed to the ISSM for approval within 5 business days.
Provide recommendation, advice and support in developing, managing and modifying, as required by change in DoD or DoN policy, cyber incident handling procedures. Provide written recommendations to the command ISSM for final approval no later than 10 business days after documented changes in policy.
Sanitize, destroy, and dispose of media cleared for destruction by Government personnel in the affected areas (E.g. hard drives, CD/DVDs, etc.) as outlined by Government approved procedures. Contractor shall notify the ISSM once task has been completed within 24-hours.
Validate DoN and DoD cybersecurity training requirements have been met by command personnel as required to maintain systems access. Provide monthly report to the COR/ISSM documenting training requirements status.
Provide on-site support to the ISSM by assisting in the preparation of weekly, monthly and ad-hoc cybersecurity policy/governance reports for management.
Other duties as assigned by Supervisor.
HGS is an equal opportunity employer and values diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
#J-18808-Ljbffr
HGS is a wholly-owned subsidiary of the Kina'ole Foundation, a 501(c)(3) non-profit established to benefit Native Hawaiian communities.
You will receive a comprehensive benefits package that includes:
Health insurance
Dental insurance
Life insurance
401K
Disability insurance
...and much, much more!
Job Description : The ISSO shall support the implementation and sustainment of the command cybersecurity program within NCTAMS PAC and its four subordinate commands/detachments by performing the following:
Utilize cybersecurity tools, procedures, and practices as prescribed by the Government.
Review and make recommendations to the NCTAMS PAC cybersecurity program regarding policies and ensure procedures are implemented and functioning in accordance with DoD and DoN cybersecurity policies. Reviews shall include, but not be limited to, the policy and procedures centered around the protection of classification categories of information including Sensitive but Unclassified, Secret, Top Secret, and Top Secret SCI. Quarterly, the contractor shall generate a summary report documenting all findings and recommended changes to the Contracting Officer Representative (COR)/Information Systems Security Manager (ISSM).
Perform an annual Quality Assurance Inspection of the commands approximate 20-25 Cybersecurity Standard Operating Procedures (SOPS) and Instructions to ensure compliance with cybersecurity policies and procedures. The contractor shall generate a QA Inspection summary report documenting all report findings and recommended changes to the COR/ISSM.
Coordinate with NCTAMS PAC Plans and Programs Department, Operations Department and Systems Program of Record for compliance review of all NCTAMS PAC system installs, modifications, and de-installations; review accreditation documentation, system cybersecurity policies and procedures, compliance services and Fleet Readiness Certification Board (FRCB) documentation. Attend monthly command Configuration Control Board (CCB) meetings. Identified Cybersecurity gaps shall be reported to the command ISSM via email within five business days after discovery.
Participate in the collection of evidence as required and directed by Navy Cyber Defensive Operations Command (NCDOC). Participate in the preservation of evidence by maintaining the chain of custody in accordance with OPNAV 5527/22 form. Submit Electronic Spillage Action Forms, after review by the Information System Security Manager (ISSM), to N00SM Security Manager and the Electronic Spillage Center distro via email within one business day of spillage report.
Review System Authorization Access Request - Navy (SAAR-N) and Privileged Access Agreement (PAA) forms within Total Workforce Management Services (TWMS) to support the issuance and management of user accounts and two-factor tokens by acting as the Trusted Agent. Respond to token requests within 3 business days by submitting requests for digital certificates to the Local Registration Authority (LRA). SAAR-N's and PAA's shall be reviewed and routed to the ISSM for approval within 5 business days.
Provide recommendation, advice and support in developing, managing and modifying, as required by change in DoD or DoN policy, cyber incident handling procedures. Provide written recommendations to the command ISSM for final approval no later than 10 business days after documented changes in policy.
Sanitize, destroy, and dispose of media cleared for destruction by Government personnel in the affected areas (E.g. hard drives, CD/DVDs, etc.) as outlined by Government approved procedures. Contractor shall notify the ISSM once task has been completed within 24-hours.
Validate DoN and DoD cybersecurity training requirements have been met by command personnel as required to maintain systems access. Provide monthly report to the COR/ISSM documenting training requirements status.
Provide on-site support to the ISSM by assisting in the preparation of weekly, monthly and ad-hoc cybersecurity policy/governance reports for management.
Other duties as assigned by Supervisor.
HGS is an equal opportunity employer and values diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
#J-18808-Ljbffr