Senior Information System Security Officer

Remote

Applications have closed

Senior Information System Security Officer   Company Overview CCG delivers solutions to the most challenging problems our nation faces in cyberspace. We combine extensive cyber tradecraft with a principled, innovative, and asymmetric approach to deliver unparalleled results. Excellence is our standard and mission success is our metric.   Role As a CCG ISSO, you will be directly embedded with the team members and developers. Additionally, you will be responsible for driving security innovation and implementation as part of the projects and CCG security posture as a whole. The role also entails the establishment and maintenance of ATO packages and their associated artifacts. We are looking for a passionate information security professional who flourishes at being in the forefront of new ideas and has a desire to learn and apply automated and cutting-edge practices.   Responsibilities
  • Assist in the creation and maintenance of automated cybersecurity mechanisms.
  • Develop and integrate cybersecurity best practices for Kubernetes clusters and DevOps pipelines.
  • Create automated artifact generation capabilities (i.e. SSP, PPSM, SCTM).
  • Maintain communication with project engineers on the implementation of security controls and policy enforcement.
  • Support the implementation of technologies into the CI/CD processes and systems to establish secure-by-default standards for CCG products.
  • Evaluate, develop and/or implement information assurance guidelines and procedures as required.
  • Recommend security solution mitigations and enhancements supporting information assurance guidelines and customer requirements.
  • Perform vulnerability/risk analysis of computer systems and applications during all phases of the system development life cycle.
  • Provide input into an Audit and Accountability Plan containing methods, procedures, and planned reviews for the continuing accreditation.
  • Ensure that all information systems meet or exceed compliance requirements.
  • Identify, report, and ensure the resolution of security violations.
  • Monitor and review the regular updates/upgrades to equipment and procedures to maintain pace with cybersecurity requirements and business needs.
Minimum Qualifications
  • 5-8 years of experience working as an ISSO or ISSE
  • Must currently hold a Secret clearance, with eligibility to obtain TS/SCI
  • Current DoDM 8570 IAM I compliance: CAP, CND, Cloud+, GSLC, Sec+, HCISPP
  • Ability to effectively communicate with various stakeholders and team members
  • Strong understanding of the Risk Management Framework (RMF) process and solid understanding of the System Development Life Cycle (SDLC)
  • Experience auditing and performing control assessments
  • Experience with integrating technologies and security solutions on information systems
  • Demonstrated experience with ATO packages
  • Demonstrated analytical and problem-solving skills
  • Strong understanding of microservices and DevOps practices

Preferred Qualifications
  • Certified Information Systems Security Professional (CISSP)
  • Experience using scanners (i.e. ACAS, Nessus, SonarQube)
  • Ability to identify needed changes to processes and activities and help to implement continuous improvement solutions
  • Have experience creating various types of vulnerability and assessment scans with multiple tools
  • Experience using eMASS or Xacta
  • Experience with OSCAL
We are an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  35  2  0

Tags: ACAS Audits CI/CD CISSP Clearance Cloud CND Compliance DevOps DoDD 8570 eMASS GSLC IAM ISSE Kubernetes Microservices Nessus Risk analysis Risk management RMF SCTM SDLC SonarQube System Security Plan TS/SCI

Region: Remote/Anywhere

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.