Information System Security Officer (ISSO)
Fall River, Massachusetts, United States
Full Time Senior-level / Expert Clearance required USD 75K - 140K *
Innovative Defense Technologies (IDT)
Innovative Defense Technologies (IDT) develops state-of-the-art automated solutions, enabling the rapid delivery of warfare capabilities for the DOD.- Coordinate with the Information System Security Manager (ISSM) and Facility Security Officer (FSO) to ensure the highest level of cybersecurity compliance for classified information systems
- Maintain the Information Systems (IS) security program and policies for assigned areas of responsibility
- Review and analyze all audit data at least weekly to ensure user activity adheres to operational security policy and procedures
- Support ISSM oversight of operational IS security implementation policy and Risk Management Framework (RMF) guidelines to the system administrators for each enclave
- Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures
- Conduct assessments and periodic testing of information systems security requirements, evaluate current security posture and recommend priorities for remediation; provide corrective action responses as they pertain to self-inspections
- Support ISSM in the development and documentation of the Plan of Action and Milestones (POA&M) for each Classified IS enclave and produce actions to mitigate identified risks
- Perform tasks related to the Continuous Monitoring (ConMon) plans that include auditing, software and hardware configuration management updates, and vulnerability assessments
- Ensure all systems are operated and maintained in accordance with documented security policies and procedures
- Perform comprehensive investigations of security incidents and ensure proper measures are taken post discovery of the incident/event
- Support the System Administrators (SAs) and ISSM on reviews of quarterly STIG compliance as it relates to Operating Systems and applications
- Assist SAs with implementation of user additions, deletions, and changes on the classified IS when required or SAs are unavailable
- Support the preparation and demonstration of compliant classified IS’s in advance of a DCSA assessments
- Ability to travel up to approximately 10%
- Other duties as assigned
Minimum Required Qualifications:
- A bachelor’s degree in Engineering, Computer Science, Information Technology, or equivalent
- 5 or more years of relevant experience, preferably in a security position
- DoD Directive 8140.03 (previously DoD 8570): candidate must meet the requirements of an IAT Level II as a condition of employment.
Required Skills:
- eMass experience
- RMF Continuous Monitoring Tooling and Systems (ACAS/Tenable, STIGViewer, etc)
- SIEM tools (Wazuh, Splunk, SolarWinds Security Event Manager)
- Cybersecurity tools (Tenable Security Center, Trellix ePO, Tanium, WSUS, RedHat Satellite)
- Linux (Red Hat)
- National Industrial Security Program Operating Manual (NISPOM), The 32 Code of Federal Regulations Part 117 and Defense Counterintelligence and Security Agency Assessment and Authorization Process Manual (DAAPM) requirements
Preferred Skills:
- Writing Policy and Procedure documentation
- Experience in working on classified systems in a DCSA accredited environment
- DCSA Authorization and Assessment Experience
- NIST 800-53 Security Control Experience
- ESXi OS
- Experience with tactical systems, virtualization
Competencies:
- Excellent verbal and written communication skills
- Attention to detail with high level of accuracy and confidentiality
- Initiative, reliability, teamwork and customer service orientation
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: ACAS Audits Clearance Compliance Computer Science DAAPM DoD DoDD 8140 DoDD 8570 eMASS Industrial Linux Monitoring NISPOM NIST NIST 800-53 POA&M Red Hat Risk management RMF Security Clearance SIEM Splunk Travel
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Security Operations Engineer jobs
- Open Senior Cybersecurity Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Information Security Officer jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Product Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open IT Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open Cyber Security Specialist jobs
- Open Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Network Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Security Consultant jobs
- Open Senior Information Security Analyst jobs
- Open Security Operations Analyst jobs
- Open Manager Pentest H/F jobs
- Open Information Security Architect jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Agile-related jobs
- Open Risk assessment-related jobs
- Open SOC-related jobs
- Open Network security-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open ISO 27001-related jobs
- Open GCP-related jobs
- Open IAM-related jobs
- Open Application security-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open Threat intelligence-related jobs
- Open DevOps-related jobs
- Open DoD-related jobs
- Open Security Clearance-related jobs
- Open APIs-related jobs
- Open CEH-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open SaaS-related jobs
- Open EDR-related jobs
- Open Java-related jobs
- Open Kubernetes-related jobs
- Open PowerShell-related jobs