G207ISSO1 - Associate Level Information System Security Officer - Cleared
Annapolis Junction, Maryland, United States
Applications have closed
NiSUS Technologies
- Review Nessus/ACAS scan results and provide direction where required
- Recognizes potential, successful, and unsuccessful scan results for efficiency in reporting compromises thorough reviews and analyses of relevant event detail and summary information
- Evaluate systems baseline security state verified through Xacta source of record systems
- Review and mitigate liens continuous assessment
- Collaborate and develop Splunk use case dashboard reporting for security baseline. Weekly reporting of system health status
- 100% Scan compliance validation for systems
- Maintain 98% asset accountability for in scope systems
- Communicates alerts regarding intrusions and compromises to their network infrastructure, applications and operating systems. Assists with implementation of counter-measures or mitigating controls
- Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined in security plans
- Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools. Safeguards the network against unauthorized infiltration, modification, destruction or disclosure
- Responds to queries and requests for computer security information and reports. Conducts investigations of computer security violations and incidents, reporting as necessary to management
- Researches, evaluates, tests, recommends, communicates and implements new security software or devices
- Implements, enforces, communicates and develops security policies or plans for data, software applications, hardware, and telecommunications
- Develops materials for computer security education/awareness programs
- Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance related technologies
- Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance
- Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration or denial of access to information
- Provides advanced guidance and leadership to less-experienced team members
- May serve as a team or task leader. (Not a people manager)
- Provides information assurance project management, technical security staff oversight, and development of critical technical documents
- Ensure compliance with regulations and privacy laws
Requirements
TS/SCI with poly required
- Position requires Five (5) years of experience as an ISSO on projects of similar scope, type, and complexity are required.
- Experience is to include at least one (1) of the following areas: knowledge of current security tools and hardware/software security implementation; communication protocols; encryption techniques/tools.
- Bachelor's degree in Computer Science or related discipline from an accredited college or university is required.
- Four (4) years of additional experience as an ISSO may be substituted for a Bachelor's degree.
- On call required for 24x7 support - Essential personnel
- Strong analytical and problem-solving skills
- Strong communications skills
- Ability to lead and work as part of a team
One or More of the Following Certifications Required:
- A+
- Network+
- CCNA Security
- CySA+
- GICSP
- GSEC
- Security+
- CND
- SSCP
- CASP
- CCNP Security
- CISA
- CISSP
- GCED
- GCIH
- CCSP
Benefits
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: ACAS Audits CASP+ CCNP CCSP CISA CISSP CND Compliance Computer Science Encryption Firewalls GCED GCIH GICSP GSEC Intrusion detection Nessus Privacy Splunk SSCP TS/SCI
Perks/benefits: 401(k) matching Health care Insurance
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Security Operations Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Cyber Security Specialist jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Senior Security Architect jobs
- Open Security Operations Analyst jobs
- Open Clearance-related jobs
- Open ISO 27001-related jobs
- Open Windows-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open SaaS-related jobs
- Open Analytics-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Java-related jobs
- Open IDS-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs
- Open CEH-related jobs
- Open IPS-related jobs