You haven't searched anything yet.
ISSO I
Description:
The Information System Security Officer (ISSO) will serve primarily on the Cybersecurity Service Security Team. This role ensures the appropriate operational security posture is maintained for information system or program. The ISSO also serves as the principal advisor to the Authorizing Official and information System Owner on all matters involving the security of the information system.
Duties:
· Evaluation of the assigned information systems’ security control compliance with the federal requirements and the client’s monitoring strategy
· Management of emerging and defined risks associated with the administration and use of assigned information systems.
· Coordination with the client’s Cybersecurity Unit to achieve and maintain the information systems’ compliance and authorization to operate (ATO)
· Ensuring systems are operated, maintained, and disposed of in accordance with policies outlined in the approved security authorization package.
· Performing annual assessments to ensure compliance with the client’s policies and standards.
· Serve as a member of the Configuration Control Board (CCB) to ensure configuration management for Cybersecurity-relevant software, hardware, and firmware is maintained and documented.
· Ensuring information system security requirement are addressed during all phases of information systems lifecycle.
· Establishing audit trails, ensuring their review, and making them available while retaining audit logs in accordance with DOJ and component policies
· Generate and interpret documentation needed to address the items detailed within the JCAM.
· Work within a team environment to provide technically sound guidance in order to adhere to the cybersecurity industry best practices and the client’s monitoring strategy.
· Analyze collected information to identify vulnerabilities and potential for exploitation and effectively present the results and guidance derived from scans to system owners or other leadership, as required.
· Effectively communicate orally and in writing to track and detail the demands, efforts, and shortcomings in meeting the goals of the client’s information system monitoring strategy
· Support the integration/testing, operations, and maintenance of systems security.
· Develops, updates, and maintains internal Standard Operating Procedures for all internal assigned functions.
· Aligns business processes and information technology strategy with the conditions and circumstances of the functional environment and establishes effective performance measures.
· Contributes to the definition and implementation of planning processes and/or systems at the enterprise level including both strategic and operational activities.
· Provides system operation support, administers hardware and software inventory.
Required Qualifications:
· Bachelor’s degree from an accredited college or university or equivalent (documented formal training) in computer science, Information systems analysis, Science/technology, information management, Information Technology, computer engineering and five (5) years overall experience with a minimum of (3) years of documented relevant work experience performing any combination of Information SPAA, cybersecurity, system administration, or engineering.
o Education Substitution
§ Any combination of certificates such as Microsoft’s MCSE, or Cisco’s CISM, CISA, CSSP, CCNA, CCDA, or CCNP, may be considered equivalent to two (2) year of general experience / information technology experience. Certificates under the DoD IAM, IAT, IASAE, or CSSP Levels I, II or III may be considered equivalent to two (2) years of information security experience.
· Secret clearance: must be eligible for a Top-Secret clearance, if requested.
· Minimum of five (3) years of relevant experience as ISSO, security analyst, or security engineer, DevSecOps security, or cloud security engineer/analyst. Familiarity with program security responsibilities to include, but not limited to the NIST RMF, audit log reviews, system monitoring, SPAA processes, FISMA requirements, vulnerability & compliance scanning, continuous monitoring activities, security testing and evaluation, and security policies.
· Highly specialized knowledge and expertise in one of more vertical disciplines such as law enforcement, anti-terrorism, biological science, banking, transportation, or other such disciplines as required to define/establish the functional or business direction of an enterprise, agency, or inter-agency requirement.
Preferred Qualifications:
Working knowledge of Microsoft Office programs
Salary range is based on whether the potential employee selects a W2 or 1099 pay range. The ranges are as follows:
W2: 105,000-111,000
1099: 123,000-128,000
Job Type: Full-time
Pay: $105,000.00 - $128,000.00 per year
Benefits:
Schedule:
Education:
Experience:
Security clearance:
Work Location: Hybrid remote in Arlington, VA 22202
Full Time
$115k-138k (estimate)
04/25/2024
08/21/2024
The job skills required for Information System Security Officer (ISSO) include Information Security, Analysis, Risk Management, Cybersecurity, Security Controls, Computer Science, etc. Having related job skills and expertise will give you an advantage when applying to be an Information System Security Officer (ISSO). That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Information System Security Officer (ISSO). Select any job title you are interested in and start to search job requirements.
The following is the career advancement route for Information System Security Officer (ISSO) positions, which can be used as a reference in future career path planning. As an Information System Security Officer (ISSO), it can be promoted into senior positions as an Information Security Analyst IV that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Information System Security Officer (ISSO). You can explore the career advancement for an Information System Security Officer (ISSO) below and select your interested title to get hiring information.
If you are interested in becoming an Information System Security Officer, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become an Information System Security Officer for your reference.
Step 1: Understand the job description and responsibilities of an Accountant.
Quotes from people on Information System Security Officer job description and responsibilities
Security officers update anti-virus software and monitor employee access levels.
03/13/2022: Savannah, GA
They develop policies that give managers and employees varying levels of access to corporate applications, systems and data, and they monitor access to ensure compliance.
03/01/2022: Muskegon, MI
Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.
Step 3: View the best colleges and universities for Information System Security Officer.