Information Systems Security Officer (ISSO)

Hanscom AFB, MA

Applications have closed

Novetta

Accenture is committed to solutions that improve outcomes, enabling a National Security posture that’s ready, intelligent and empowered. Learn more.

View company page

Join our team dedicated to developing and executing innovative solutions in support of customer mission success. Novetta is committed to cultivating a diverse, inclusive workplace culture, embracing our differences and perspectives to build a stronger, more successful company.

Job Description: 

Novetta is seeking an ISSO to be responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.  The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness.  It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.  This will include assessing the security impact of those changes and making recommendation to the ISSM.  The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.  The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.

Responsibilities include:

  • Assist the ISSM in meeting their duties and responsibilities
  • Prepare, review, and update authorization packages
  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package
  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals
  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)
  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
  • Prepare reports on the status of security safeguards applied to computer systems
  • Perform ISSO duties in support of in-house and external customers
  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries

Basic Qualifications:

  • 2 - 5 years related experience
  • Prior performance in roles such as System, Network Administrator or ISSO
  • Bachelor’s degree or equivalent experience (4 years)
  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire

Desired Skills:

  • Eligibility for access to Special Access Program Information

Security Clearance:

  • Active TS SCI
  • Must be willing to undergo CI polygraph 

Novetta, from complexity to clarity.

Novetta delivers highly scalable advanced analytics and secure technology solutions to address challenges of national and global significance. Focused on mission success, Novetta pioneers disruptive technologies in machine learning, data analytics, full-spectrum cyber, cloud engineering, open source analytics, and multi-INT fusion for Defense, Intelligence Community, and Federal Law Enforcement customers. Novetta is headquartered in McLean, VA with over 1,300 employees across the U.S. 

Our culture is shaped by a commitment to our core values:

Integrity • We hold ourselves accountable to the highest standards of integrity and ethics.

Customer Success • We strive daily to exceed expectations and achieve customer mission success.

Employee Focus • We invest in our employees’ professional development and training, respecting individuality, and fostering a culture of diversity and inclusion.

Innovation • We know that discovering new and innovative ways to solve problems is critical to our success and makes us a great company.

Excellence in Execution • We take pride in flawless execution as we build a company that is best in class.

Earn a REFERRAL BONUS for the qualified people you know.  

For more details or to submit a referral, visit bit.ly/NovettaReferrals.

Novetta is an equal opportunity/affirmative action employer.

All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected veteran status, age, or any other characteristic protected by law.

Tags: Analytics Clearance Cloud Compliance DoD DoDD 8570 Machine Learning Monitoring Open Source Polygraph SAP Security Clearance Security Impact Analysis Vulnerabilities

Perks/benefits: Career development Salary bonus

Region: North America
Job stats:  9  2  0
Category: Leadership Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.