Information Systems Security Officer II
Dayton, OH, US
P-11 Security
P-11 Security is a P-11 Security is a Minority Woman-Owned Small Business Security Company headquartered in Southern California.Description
P-11 Security, based in Southern California, is a certified Economically-Disadvantaged Women-Owned Small Business (EDWOSB) with over 25 years of expertise in the security field. Specializing in Security in Depth (SiD) services, we deliver an integrated suite of 360 Security Services, Cyber Security, and Information Technology solutions, embodying our commitment to Multi-Layered Defense for Maximum Security. Our strategies are meticulously adapted to the unique challenges faced by the Defense Industry Base, military installations, government agencies, and educational institutions, ensuring tailored and effective security solutions.
At P-11 Security, we are driven by a mission to empower our clients with comprehensive security measures that protect their operations across every layer. Our vision is to lead the industry as the premier provider of SiD solutions, renowned for our innovation, client-focused approach, and unwavering commitment to excellence. Upholding values of integrity, diversity, and respect, we foster an environment where our team of seasoned professionals can thrive and contribute to the safety and security of our clients. Join us in making a significant impact in a challenging and rewarding field, where your efforts ensure stability and security for our clients' critical missions.
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
- Assist the ISSM in meeting their duties and responsibilities
- Prepare, review, and update authorization packages
- Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
- Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
- Conduct periodic reviews of information systems to ensure compliance with the security authorization package
- Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
- Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
- Ensure all IS security-related documentation is current and accessible to properly authorized individuals
- Ensure audit records are collected, reviewed, and documented (to include any anomalies)
- Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
- Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
- Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
- Prepare reports on the status of security safeguards applied to computer systems
- Perform ISSO duties in support of in-house and external customers
- Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Requirements
Experience:
- 2 - 5 years related experience
- Prior performance in roles such as System/Network Administrator or ISSO
Education:
Bachelor’s degree or equivalent experience (4 years)
Certifications:
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire
Security Clearance:
- Current Top Secret Clearance with SCI Eligibility
- Eligibility for access to Special Access Program Information
- Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must be able to regularly lift up to 50 lbs
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Clearance Compliance DoD DoDD 8570 Monitoring Polygraph SAP Security Clearance Security Impact Analysis Top Secret Top Secret Clearance Vulnerabilities
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Cloud Security Architect jobs
- Open Product Security Engineer jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Information Security Specialist jobs
- Open Cybersecurity Analyst jobs
- Open Information Security Officer jobs
- Open Senior Product Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Chief Information Security Officer jobs
- Open Cyber Security Specialist jobs
- Open Staff Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Ethical hacker / Pentester H/F jobs
- Open IT Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Manager Pentest H/F jobs
- Open Cybersecurity Consultant jobs
- Open Security Operations Analyst jobs
- Open Security Consultant jobs
- Open IT Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Information System Security Officer jobs
- Open Senior Network Security Engineer jobs
- Open CISM-related jobs
- Open C-related jobs
- Open Risk assessment-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Analytics-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open Threat intelligence-related jobs
- Open Security assessment-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open DoD-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open DevOps-related jobs
- Open Splunk-related jobs
- Open IDS-related jobs
- Open APIs-related jobs
- Open IPS-related jobs
- Open Kubernetes-related jobs