Recent Searches

You haven't searched anything yet.

2 Information System Security Officer(ISSO) I Jobs in Maryland, NY

SET JOB ALERT
Details...
Chiron Technology Services, Inc.
Maryland, NY | Other
$80k-97k (estimate)
9 Months Ago
Chiron Technology Services, Inc.
Maryland, NY | Other
$68k-83k (estimate)
11 Months Ago
Information System Security Officer(ISSO) I
$80k-97k (estimate)
Other | Medical Technology 9 Months Ago
Save

Chiron Technology Services, Inc. is Hiring an Information System Security Officer(ISSO) I Near Maryland, NY

Overview

Chiron Technology Services, Inc. currently has an Information System Security Officer I career opportunity in the Annapolis Junction, MD area. An active TS/SCI w/Polygraph Clearance is required for this position.

Requirements:

  • Minimum 5 continuous years of work experience in Information Systems Security or a related field.
  • Bachelor's degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university. Four (4) years of additional ISSO experience may be substituted for a Bachelor's degree. 

Qualifications:

  • Conduct continuous monitoring of authorized, operational information systems (IS) to assess the effectiveness of security controls in an information system, on an ongoing basis, to determine system security status, which includes:

  • Conducting configuration management and assist the Government with the control of information system components

  • Providing security impact analyses of changes to a system or its environment of operation

  • Conducting ongoing assessments of security controls

  • Recommend security policies to the Government; execute technical security safeguards and operation security measures

  • Access data, control information, software, hardware, and firmware

  • Complete and maintain documentation for Security Authorization of each IS

  • Update System Security Plans (SSPs) each time the posture (e.g., hardware and software) of an IS is modified; if the modification(s) trigger a reauthorization, the contractor shall review and update all documentation for Security Authorization

  • Assist the Government in determining how modifications and/or introduction of new technology will impact the performance and security of their system(s)

  • Obtain Security Authorization for ISS; operate and maintain authorized ISS in accordance with the approved SSP

  • Provide recommendations to the Government concerning NSA/CSS authorized users access to the ISS; inspect for appropriate clearances, indoctrinations, and validate need-to-know for information

  • Determine whether all remote and network connections meet or exceed the ISS requirements of the IS; report findings to the Government

  • Administer the user identification and authentication mechanisms of the IS; when direct control of these mechanisms is not feasible, coordinate with the Government to recommend a manner in which the mechanisms can be used most effectively

  • Remove user accounts once access to the IS is no longer required

  • Obtain proper approvals and follow proper purging procedures when storage devices or other components capable of storing data are prepared for release

  • Identify the appropriate color-coded classification and monitoring label stickers on all computer monitors and CPU unit/containers

  • Provide the Government, in writing, any security weaknesses identified

  • Recommend security improvements for the IS

  • Assist the Government in applying physical and operational procedures to prevent a compromise of IS security, or negation of its Security Authorization

  • Review the IS security audit documents in accordance with NSA/CSS policy and procedures

  • Immediately report all security incidents involving ISs in accordance with NSA/CSS policies and procedures for computer security incidents

  • Advise authorized users of security features and procedures used on the IS

  • Assist the Government to ensure that maintenance personnel are granted only those privileges required to perform their job

  • Use configuration management to maintain and protect the security posture of the IS; coordinate all changes to the operating systems software or applications software with the Government

  • In coordination with the Government, participate in configuration control board activities

  • Maintain records on ISs, outlining required patches/system upgrades that have been accomplished throughout an IS' s life cycle

  • In the Government's internal tracking system, maintain records for workstations, servers, routers, firewalls, intelligent hubs, network switches, and telephony equipment; include in the records: POC, action taken (referencing any IAVA, CERTs involved), and date action completed

  • Assist the Government with implementing and managing the Information Assurance (IA) Program

  • Track and report organizational trends in the XACTA Information Assurance Manager (XIAM) Tool with regard to the security posture of systems, and work with the Government to resolve deficiencies or problems

  • Assist the Government in managing common control families, as defined in CNSS Instruction No. 1253, dated October 2009

  • Provide guidance/recommendations to the Government on IA best practices and procedures, compliant with the Risk Management Framework

  • Serve as the IA liaison to the Government

  • Work with the NSA Information Security Incident Response Team (NISIRT) and oversee resolution of computer security incidents and vulnerability compliance

  • Assist the Government in the development and review of Intelligence Community (IC) and NSA/CSS policy

  • Provide IA Workforce Improvement Program (IAWIP) support for the Government

  • Provide communications support on non-system specific OISS plans, policies, or procedures

  • Provide the Government assistance with special interest security activities

  • Review and provide recommendations for cross-domain transfers

  • Provide and evolve the existing Information System Security Officer (ISSO) Registration Tool in order to 1) qualify ISSOs based on experience level, skill sets, and certifications; 2) provide a fully qualified ISSO workforce that is registered, ISSO compliant, and validated with continually improving skill sets; 3) provide Information and System Security Risk Management, TS3 Management, an assessment tool to make decisions based on the ISSO workforce demographics, in order to enable effective global problem solving, logically and physically.

  • As needed, respond to off duty calls for assistance with broken or non-functioning IS

We are an EEO/AA Employer. We do not discriminate in hiring on the basis of race, color, national origin, sex, gender identity, sexual orientation, religion, age, disability, protected veteran status, or any other characteristic protected by federal, state or local law. If you need a reasonable accommodation for any part of the employment process, please contact us by email at careers@chirontech.com, let us know the nature of your request and your contact information. Requests for accommodation will be considered on a case-by-case basis. Please note that only inquiries concerning a request for reasonable accommodation will be responded to from this e-mail address.

Job Summary

JOB TYPE

Other

INDUSTRY

Medical Technology

SALARY

$80k-97k (estimate)

POST DATE

07/01/2023

EXPIRATION DATE

04/02/2025

WEBSITE

chirontech.com

HEADQUARTERS

ALLISON PARK, PA

SIZE

50 - 100

FOUNDED

2004

CEO

RON POROPATICH

REVENUE

$10M - $50M

INDUSTRY

Medical Technology

Related Companies
About Chiron Technology Services, Inc.

Chiron Technology Services, Inc. is a leading cybersecurity firm that provides public sector and commercial clients with Information Operations (IO) cyber training, Information Assurance (IA), and engineering services. Based in Columbia, MD, the Chiron team is comprised of engineers, analysts, and subject matter experts who have years of real-world practical experience solving industry's most difficult challenges. Chiron takes a proactive posture for our customers while complying with industry accepted engineering and IA policy.

Show more

Chiron Technology Services, Inc.
Other
$79k-102k (estimate)
2 Weeks Ago
Chiron Technology Services, Inc.
Other
$89k-123k (estimate)
1 Month Ago
Chiron Technology Services, Inc.
Other
$59k-65k (estimate)
2 Months Ago

The job skills required for Information System Security Officer(ISSO) I include Information Security, Security Systems, Risk Management, Incident Response, Information Assurance, Security Controls, etc. Having related job skills and expertise will give you an advantage when applying to be an Information System Security Officer(ISSO) I. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Information System Security Officer(ISSO) I. Select any job title you are interested in and start to search job requirements.

For the skill of  Information Security
LHI Group
Full Time
$119k-150k (estimate)
1 Day Ago
For the skill of  Security Systems
Carnegie Affiliates
Full Time
$106k-138k (estimate)
1 Month Ago
For the skill of  Risk Management
Easterseals NY
Temporary | Full Time
$75k-122k (estimate)
Just Posted
Show more

The following is the career advancement route for Information System Security Officer(ISSO) I positions, which can be used as a reference in future career path planning. As an Information System Security Officer(ISSO) I, it can be promoted into senior positions as an Information Security Analyst IV that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Information System Security Officer(ISSO) I. You can explore the career advancement for an Information System Security Officer(ISSO) I below and select your interested title to get hiring information.

If you are interested in becoming an Information System Security Officer, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become an Information System Security Officer for your reference.

Step 1: Understand the job description and responsibilities of an Accountant.

Quotes from people on Information System Security Officer job description and responsibilities

Security officers update anti-virus software and monitor employee access levels.

03/13/2022: Savannah, GA

They develop policies that give managers and employees varying levels of access to corporate applications, systems and data, and they monitor access to ensure compliance.

03/01/2022: Muskegon, MI

Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.

Step 3: View the best colleges and universities for Information System Security Officer.

Butler University
Carroll College
Cooper Union
High Point University
Princeton University
Providence College
Show more