G157 - Mid-level Information System Security Officer - Cleared
Annapolis Junction, Maryland, United States
Applications have closed
NiSUS Technologies
• Review Nessus scan results and provide direction where required
• Recognizes potential, successful, and unsuccessful scan results for efficiency in reporting compromises thorough reviews and analyses of relevant event detail and summary information
• Evaluate systems baseline security state verified through Xacta source of record systems
• Review and mitigate liens (POAMs)- continuous assessment
• Collaborate and develop Splunk use case dashboard reporting for security baseline
• Weekly reporting of system health status
• 100% Scan compliance validation for systems
• Maintain 98% asset accountability for in scope systems
• Communicates alerts regarding intrusions and compromises to their network infrastructure, applications and operating systems
• Assists with implementation of counter-measures or mitigating controls
• Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans
• Develops, tests, and operates firewalls, intrusion detection systems, anti-virus systems and software deployment tools
• Safeguards the network against unauthorized infiltration, modification, destruction or disclosure
• Responds to queries and requests for computer security information and reports
• Conducts investigations of computer security violations and incidents, reporting as necessary to management
• Researches, evaluates, tests, recommends, communicates and implements new security software or devices
• Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications
• Develops materials for computer security education/awareness programs
• Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies
• Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance
• Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information
• Provides advanced guidance and leadership to less-experienced team members
• May serve as a team or task leader. (Not a people manager)
• Provides information assurance project management, technical security staff oversight, and development of critical technical documents
• Ensure compliance with regulations and privacy laws
Schedule: Monday through Friday Day Shift
Requirements
TS/SCI with poly required
- 10 years of related experience and a Bachelor's degree (or 4 additional years)
- In addition, position requires Five (5) years of experience as an ISSO on projects of similar scope, type, and complexity are required.
- Experience is to include at least one (1) of the following areas: knowledge of current security tools and hardware/software security implementation; communication protocols; encryption techniques/tools.
- On call required for 24x7 support - Essential personnel
- Strong analytical and problem-solving skills
- Strong communications skills
- Ability to lead and work as part of a team
Must have at least one of these certifications:
- CCNA Security
- CySA+
- GICSP
- GSEC
- Security_ CE
- CND
- SSCP
- CASP+ CE
- CCNP Security
- CISA
- CISSP (or Associate)
- GCED
- GCIH
Benefits
- Health & Life Insurance
- Dental Insurance
- Disability Insurance
- 401K Retirement Plan with Matching
- Tuition Assistance
- Vacation and Sick Leave
- Hiring Bonuses
- Referral Recruitment Program
Tags: Audits CASP+ CCNP CISA CISSP Compliance Encryption Firewalls GCED GCIH GICSP GSEC Intrusion detection Nessus Privacy Splunk SSCP TS/SCI
Perks/benefits: 401(k) matching Health care Insurance
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Ethical hacker / Pentester H/F jobs
- Open Information Security Specialist jobs
- Open Cyber Security Specialist jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Architect jobs
- Open Senior Cyber Security Engineer jobs
- Open Product Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Staff Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cybersecurity Consultant jobs
- Open Security Specialist jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Senior Security Architect jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open IT Security Engineer jobs
- Open Clearance-related jobs
- Open ISO 27001-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Agile-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open SaaS-related jobs
- Open Analytics-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open Security Clearance-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Malware-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs
- Open CEH-related jobs
- Open Forensics-related jobs