Information System Security Officer (ISSO)

Chantilly, VA, United States

Peraton

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly...

View company page

Responsibilities

Peraton is seeking a Information Assurance Engineer in Chantilly, VA to support our Intelligence Community customer as part of a highly talented, highly motivated and high-performing team. As part of the engineering team you will support an exciting program which involves design, development, test, and deployment of an exciting and complex system in an Agile construct to contribute to mission success for a variety of stakeholders.  Join us and be part of the next generation of innovators as we blaze a trail forward for our profession and company.

 

What you’ll do:

  • Provide expertise in the maintenance, support and enhancement of the IT security framework, network infrastructure, software applications/tools, operational processes, and control documentation.
  • Develop security requirements and conduct security activities to support coding, testing, installation, certification, and deployment for cloud-based and ground-based environments to include migration of some customer systems to the cloud environment.
  • Develop and maintain the program System Security Plan and Test and Accreditation Package (TAP) in accordance with Risk Management Framework (RMF) documentation.
  • Secure system configurations (i.e. STIGs) and installs security tools, scan systems in order to determine compliancy, and report results. 
  • Conduct vulnerability assessments, provide continuous monitoring of system assets, and develop risk mitigation strategies.
  • Support security planning, execution, report of findings, and resolution of findings for and during system testing.
  • Primary subject matter expert support to management and the customer for program Information Assurance matters.
  • Provide Information Assurance (IA) expertise, develop, and maintain security accreditation documentation to support program Certification and Accreditation (C&A) in accordance with DoDD 8570.01.

Qualifications

Required Qualifications:

  • Minimum of 2 years with BS/BA; 0 years with MS/MA; 6 years without degree. Additional experience may be substituted for educational degree. 
  • This position requires the candidate possess a minimum of Top Secret clearance with ability to upgrade to TS/SCI and pass a polygraph within 30 days of employment or at customers request- Contract requires TS/SCI with poly   The candidate must maintain the clearance. 
  • You have a Bachelor’s degree in Information Systems, Computer Science, engineering, or related technical field and 8+ years of total experience. Equivalent experience may be substituted for degree.
  • You are Department of Defense Directive (DoDD) 8570.01, IAM-III certified (CAP, CASP+ CE, CISM, CISSP, GSLC, CCISO, etc.) or working towards certification and can obtain within 6 months of employment.
  • You have 3+ years of experience in Linux and Windows systems, IT and Networking Infrastructure.
  • You have experience and are familiar with  NIST 800-53, ICD-503, CISSP 1253, and JSIG
  • You have experience in security experience in risk management, requirements analysis, design, test, and certification. 
  • You can express yourself confidently, concisely, and accurately through written and oral communications.
  • You have excellent interpersonal skills and the ability to collaborate effectively with management, the customer and tenants across DoD.
  • You are detail / process oriented, can multi-task, and the ability to work with minimal supervision.

Preferred Qualifications:

  • You are familiar with current DoD/IC systems and doctrine, with an emphasis on Cross-Domain Solution (CDS) guards, network/system security, and tactical and joint C4I systems. 
  • You are familiar with any or all of the following commercial technologies, system security tools, and processes: Splunk, Nessus/Security Center, Rational development tools, Ansible, J2EE architectures, SOA, Web Services, OpenStack, Docker Containers, XML, XSLT, HTML, Java Servlets, LDAP, SSL, and/or networking protocols.

Peraton offers enhanced benefits to employees working on this critical National Security program, which include heavily subsidized employee benefits coverage for you and your dependents, 25 days of PTO accrued annually up to a generous PTO cap and eligible to participate in an attractive bonus plan

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$112,000 - $179,000. This represents the typical salary range for this position based on experience and other factors.
Apply now Apply later
  • Share this job via
  • or

Tags: Agile Ansible C CASP+ CISM CISSP Clearance Cloud Computer Science Docker DoD DoDD 8570 GSLC IAM Java LDAP Linux Monitoring Nessus NIST NIST 800-53 OpenStack Polygraph Risk management RMF Splunk STIGs System Security Plan Top Secret Top Secret Clearance TS/SCI Windows XML

Perks/benefits: Salary bonus

Region: North America
Country: United States
Job stats:  6  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.