G207ISSO1 - Associate Level Information System Security Officer - Cleared
Annapolis Junction, Maryland, United States
NiSUS Technologies
- Review Nessus/ACAS scan results and provide direction where required
- Recognizes potential, successful, and unsuccessful scan results for efficiency in reporting compromises thorough reviews and analyses of relevant event detail and summary information
- Evaluate systems baseline security state verified through Xacta source of record systems
- Review and mitigate liens continuous assessment
- Collaborate and develop Splunk use case dashboard reporting for security baseline. Weekly reporting of system health status
- 100% Scan compliance validation for systems
- Maintain 98% asset accountability for in scope systems
- Communicates alerts regarding intrusions and compromises to their network infrastructure, applications and operating systems. Assists with implementation of counter-measures or mitigating controls
- Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans
- Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools. Safeguards the network against unauthorized infiltration, modification, destruction or disclosure
- Responds to queries and requests for computer security information and reports. Conducts investigations of computer security violations and incidents, reporting as necessary to management
- Researches, evaluates, tests, recommends, communicates and implements new security software or devices
- Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications
- Develops materials for computer security education/awareness programs
- Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies
- Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance
- Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information
- Provides advanced guidance and leadership to less-experienced team members
- May serve as a team or task leader. (Not a people manager)
- Provides information assurance project management, technical security staff oversight, and development of critical technical documents
- Ensure compliance with regulations and privacy laws
Requirements
TS/SCI with poly required
- Position requires Five (5) years of experience as an ISSO on projects of similar scope, type, and complexity are required.
- Experience is to include at least one (1) of the following areas: knowledge of current security tools and hardware/software security implementation; communication protocols; encryption techniques/tools.
- Bachelor's degree in Computer Science or related discipline from an accredited college or university is required.
- Four (4) years of additional experience as an ISSO may be substituted for a Bachelor's degree.
- On call required for 24x7 support - Essential personnel
- Strong analytical and problem-solving skills
- Strong communications skills
- Ability to lead and work as part of a team
One or More of the Following Certifications Required:
- A+
- Network+
- CCNA Security
- CySA+
- GICSP
- GSEC
- Security+
- CND
- SSCP
- CASP
- CCNP Security
- CISA
- CISSP
- GCED
- GCIH
- CCSP
Benefits
* Salary range is an estimate based on our salary survey 💰
Tags: Audits CASP+ CCNP CCSP CISA CISSP Compliance Computer Science Encryption Firewalls GCED GCIH GICSP GSEC Intrusion detection Nessus Privacy Splunk SSCP TS/SCI
Perks/benefits: 401(k) matching Health care Insurance
More jobs like this
Explore more InfoSec/Cybersecurity career opportunities
Find open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Analysis, Cryptography, Digital Forensics and Cyber Security in general, filtered by job title or popular skill, toolset and products used.
- Open Information Security Specialist jobs
- Open Security Operations Analyst jobs
- Open Senior Information Security Analyst jobs
- Open Senior SOC Analyst jobs
- Open Staff Product Security Engineer jobs
- Open Security Operations Engineer jobs
- Open Senior Cybersecurity Engineer jobs
- Open Electronic Warfare Advanced Tactical Trainer jobs
- Open IT Security Engineer jobs
- Open IT Security Analyst jobs
- Open Information System Security Officer (ISSO) jobs
- Open Cyber Security Specialist jobs
- Open Manager Pentest H/F jobs
- Open Head of Information Security jobs
- Open Cyber Hunt SME jobs
- Open Security Consultant jobs
- Open Analyste CERT / Incident Responder senior (H/F) jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Staff Application Security Engineer jobs
- Open Lead Security Engineer jobs
- Open Senior Security Operations Engineer jobs
- Open Senior Information Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Analyste CERT / Incident Responder junior (H/F) jobs
- Open Senior Security Analyst jobs
- Open Application security-related jobs
- Open Governance-related jobs
- Open Network security-related jobs
- Open Risk assessment-related jobs
- Open Pentesting-related jobs
- Open ISO 27001-related jobs
- Open Clearance-related jobs
- Open DevOps-related jobs
- Open Kubernetes-related jobs
- Open Vulnerability management-related jobs
- Open DevSecOps-related jobs
- Open Analytics-related jobs
- Open Java-related jobs
- Open IAM-related jobs
- Open CISM-related jobs
- Open SaaS-related jobs
- Open APIs-related jobs
- Open CI/CD-related jobs
- Open Forensics-related jobs
- Open Malware-related jobs
- Open CISA-related jobs
- Open Threat intelligence-related jobs
- Open Terraform-related jobs
- Open IDS-related jobs
- Open OWASP-related jobs