Recent Searches

You haven't searched anything yet.

62 Information System Security Officer - (ISSO) Jobs in Washington, DC

SET JOB ALERT
Details...
Peraton
Washington, DC | Full Time
$104k-125k (estimate)
2 Days Ago
Booz Allen
Washington, DC | Full Time
$94k-113k (estimate)
1 Day Ago
Fusiontechnology Llc
Washington, DC | Full Time
$106k-128k (estimate)
5 Days Ago
Gen3 Technology Consulting LLC
Washington, DC | Full Time
$150k-184k (estimate)
1 Month Ago
Information System Security Officer - (ISSO)
$178k-222k (estimate)
Full Time 1 Month Ago
Save

Career Opportunities – Envisioneering Inc is Hiring an Information System Security Officer - (ISSO) Near Washington, DC

Job Title
Information System Security Officer - (ISSO)
Location
Washington, DC 20375 US (Primary)
Job Type
Full-Time
Education
Bachelor's Degree
How much will you travel if the job requires it?
0 - 25%
Minimum Security Clearance Required
TS
Job Description

Envisioneering, Inc. is seeking an Information Systems Security Officer (ISSO) to support an active government contract. This position will be responsible for the following:

  • Lead the RMF process for assigned programs, organizations, systems, or enclaves.
  • Maintain and report system’s A&A status and events.
  • Manage the SP for assigned systems throughout their lifecycle.
  • Perform annual security reviews, annual testing of security controls, and annual testing of the contingency plan, in line with FISMA requirements.
  • Manage POA&M entries and ensuring vulnerabilities are properly tracked, mitigated, and resolved.
  • Assist with identification of the security control baseline set and any applicable overlays.
  • Supervise the validation of security controls with the PM/ISO, SCA Liaison, PSO, and AO CSA.
  • Assemble the Security Authorization Package and submit for adjudication.
  • Register and maintain the system in eMASS.
  • Assess the quality of security control implementation against all requirements in accordance with the approved SLCM strategy.
  • Plan and perform cybersecurity testing to assess security controls and recording security control compliance status during sustainment.
  • Report changes in the security posture of systems to the AO.
  • Utilize the Collaboration Board in eMASS workflow for all formal coordination during the RMF process. Detailed findings will be posted in the Artifacts tab (if necessary).
  • Assist the ISSMs in executing their duties and responsibilities.
  • Ensure compliance with all USN, DON, and DoD cybersecurity policies.
  • Ensure all users possess the requisite security clearances and awareness of their responsibilities for systems under their purview prior to being granted access.
  • Ensure an incident response, business continuity, disaster recovery, as well as vulnerability and threat reporting plans and channels are in place and that team members are trained accordingly.
  • Ensure relevant policy and procedural documentation is current and accessible to properly authorized individuals.
  • Utilize the Collaboration Board in the eMASS workflow for all formal coordination during the RMF process. Detailed findings will be posted in the Artifacts tab (if necessary).

Assist the ISSE with the following responsibilities:

  • Oversee the development and maintenance of a system’s cybersecurity solutions.
  • Identify AO and SCA cognizance (i.e. FAO or NAO, and FSCA or SCA) of the system as well as any specific authorization requirements such as reciprocity, cross domain, and applicable overlays to support System Categorization.
  • Identify mission criticality.
  • Identify and tailor the security control baseline with applicable overlays.
  • Assist with development, maintenance, and tracking of the SP.
  • Lead the security control implementation and testing efforts.
  • Perform vulnerability-level risk assessment on the POA&M/RISK Assessment Worksheet.
  • Assist with any security testing required as part of A&A or annual reviews.
  • Assist in the mitigation and closure of open vulnerabilities under the system’s change control process.
  • Oversee cybersecurity testing to assess security controls and recording security control compliance status during the continuous monitoring phase of the lifecycle.
  • Make data entries into the eMASS record and POA&M consistent with implementation results.
  • Utilize the Collaboration Board in the eMASS workflow for all formal coordination during the RMF process. Detailed findings will be posted in the Artifacts tab (if necessary).
  • Rework shall be documented and provided to the PSO/PMO for review.

Assist the ISSM with the following responsibilities:

  • Support necessary compliance activities (e.g., ensure system security configuration guidelines are followed, compliance monitoring occurs).
  • Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
  • Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.
  • Advise senior management (e.g., CIO) on risk levels and security posture.
  • Advise appropriate senior leadership or Authorizing Official of changes affecting the organization’s cybersecurity posture.
  • Collect and maintain data needed to meet system cybersecurity reporting.
  • Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.
  • Ensure security improvement actions are evaluated, validated, and implemented as required.
  • Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment.
  • Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s).
  • Evaluate and approve development efforts to ensure that baseline security safeguards are appropriately installed.
  • Identify alternative information security strategies to address organizational security objective.
  • Identify information technology (IT) security program implications of new technologies or technology upgrades.
  • Interpret patterns of non compliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise’s cybersecurity program.
  • Manage the monitoring of information security data sources to maintain organizational situational awareness.
  • Oversee the information security training and awareness program.
  • Participate in an information security risk assessment during the Security Assessment and Authorization process.
  • Participate in the development or modification of the computer environment cybersecurity program plans and requirements.
  • Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations.
  • Provide system related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents.
  • Recognize a possible security violation and take appropriate action to report the incident, as required.
  • Recommend resource allocations required to securely operate and maintain an organization’s cybersecurity requirements.
  • Supervise or manage protective or corrective measures when an cybersecurity incident or vulnerability is discovered.
  • Track audit findings and recommendations to ensure appropriate mitigation actions are taken.
  • Promote awareness of security issues among management and ensure sound security principles are reflected in the organization’s vision and goals.
  • Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.
  • Identify security requirements specific to an information technology (IT) system in all phases of the System Life Cycle.
  • Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
  • Assure successful implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization’s mission and goals.
  • Participate in the acquisition process as necessary, following appropriate supply chain risk management practices.
  • Ensure all acquisitions, procurements , and outsourcing efforts address information security requirements consistent with organization goals.
  • Forecast ongoing service demands and ensure security assumptions are reviewed as necessary.
  • Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate.
  • Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program.
  • Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, and systems, and elements.
  • Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance.
  • Ensure that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture.
  • Establish overall enterprise information security architecture (EISA) with the organization’s overall security strategy.
  • Evaluate cost benefit, economic, and risk analysis in decision making process.
  • Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information.
  • Interpret and/or approve security requirements relative to the capabilities of new information technologies.
  • Lead and align information technology (IT) security priorities with the security strategy.
  • Lead and oversee information security budget, staffing, and contracting.
  • Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency.
  • Manage threat or target analysis of cyber defense information and production of threat information within the enterprise.
  • Monitor and evaluate the effectiveness of the enterprise’s cybersecurity safeguards to ensure they provide the intended level of protection.
  • Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans.
  • Provide leadership and direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities.
  • Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to higher headquarters.
  • Recommend policy and coordinate review and approval.
  • Use federal and organization-specific published documents to manage operations of their computing environment system(s).
  • Participate in Risk Governance process to provide security risks, mitigations, and input on other technical risk.
  • Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements.
Job Requirements

MINIMUM SKILLS / QUALIFICATIONS:

  • Must have and maintain a DoD Top Secret Clearance.
  • 15 years of technical and managerial experience in system administration and information security/cybersecurity.
  • CISSP, CISM, or other DOD 8570.01-M IAM Level 3 certification.
  • Bachelor’s degree with a concentration in a related discipline (e.g., information security, cybersecurity, information technology)
  • Self-motivated and the ability to multi-task and balance multiple goals and priorities.
  • Must be familiar with DOD Risk Management Framework (RMF) policies, standards, procedures and have relevant experience with associated tools (e.g., eMASS, XACTA 360, Assured Compliance Assessment Solution (ACAS), Anchore, DISA Security Technical Implementation Guides (STIGs), SCAP Compliance Checker (SCC), STIG Viewer, eMASSter, Eval STIG).

Education:

  • Bachelor’s degree with a concentration in a related discipline (e.g., information security, cybersecurity, information technology).
  • CISSP, CISM, or other DOD 8570.01-M IAM Level 3 certification.

Benefits:Envisioneering, Inc. offers a stable work environment, a competitive salary, and a comprehensive benefits package effective date of hire; including 401k, Medical/Dental/Vision, FSA, Short Term, Long Term, AD&D and Life insurance, (employer paid), voluntary life, Tuition Reimbursement, Paid Leave, Holidays and much more.

As a condition of employment: You must pass a drug and pre-employment drug screening. U.S. Citizenship Required. Candidate must follow all company and non-DOT Drug and Alcohol Testing. A Department of Defense (DoD) Top Secret security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required. Please confirm in your cover letter or resume.

Envisioneering Inc. is an Equal Opportunity Employer that does not discriminate on the basis of actual or perceived race, creed, color, religion, alienage or national origin, ancestry, citizenship and immigration status, age, disability or handicap, sex (including pregnancy), marital status, veteran status, sexual orientation, gender identity, genetic information, arrest record, hairstyle, or any other characteristic protected by applicable federal, state, or local laws. Our management team is dedicated to this policy with respect to recruitment, hiring, placement, promotion, transfer, training, compensation, benefits, employee activities, and general treatment during employment. Envisioneering Inc. is committed to creating and maintaining a workplace in which all employees have an opportunity to participate and contribute to the success of the business and are valued for their skills, experience, and unique perspectives.

Job Summary

JOB TYPE

Full Time

SALARY

$178k-222k (estimate)

POST DATE

03/10/2024

EXPIRATION DATE

05/09/2024

Show more

The job skills required for Information System Security Officer - (ISSO) include Information Security, Security Systems, Risk Management, Cybersecurity, IT Security, Incident Response, etc. Having related job skills and expertise will give you an advantage when applying to be an Information System Security Officer - (ISSO). That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Information System Security Officer - (ISSO). Select any job title you are interested in and start to search job requirements.

For the skill of  Information Security
Dhara Consulting Group
Other
$114k-137k (estimate)
1 Month Ago
For the skill of  Security Systems
Command Services & Support, Inc.
Full Time
$102k-127k (estimate)
Just Posted
For the skill of  Risk Management
SAIC
Full Time
$66k-88k (estimate)
2 Months Ago
Show more

The following is the career advancement route for Information System Security Officer - (ISSO) positions, which can be used as a reference in future career path planning. As an Information System Security Officer - (ISSO), it can be promoted into senior positions as an Information Security Analyst IV that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Information System Security Officer - (ISSO). You can explore the career advancement for an Information System Security Officer - (ISSO) below and select your interested title to get hiring information.

Full Time
$106k-128k (estimate)
3 Weeks Ago

If you are interested in becoming an Information System Security Officer, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become an Information System Security Officer for your reference.

Step 1: Understand the job description and responsibilities of an Accountant.

Quotes from people on Information System Security Officer job description and responsibilities

Security officers update anti-virus software and monitor employee access levels.

03/13/2022: Savannah, GA

They develop policies that give managers and employees varying levels of access to corporate applications, systems and data, and they monitor access to ensure compliance.

03/01/2022: Muskegon, MI

Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.

Step 3: View the best colleges and universities for Information System Security Officer.

Butler University
Carroll College
Cooper Union
High Point University
Princeton University
Providence College
Show more