What are the responsibilities and job description for the Information Systems Security Officer- Journeyman position at Command Cyber Solutions, LLC?
Essential Duties & Responsibilities
Education, Certification & Experience Requirements:
Knowledge, Skills & Abilities:
- Security Planning and Implementation:
- Assist in developing, implementing, and maintaining security plans, policies, and procedures for assigned information systems in accordance with DoD Instruction 8510.01 (Risk Management Framework for DoD Information Technology) and other applicable guidance.
- Assist in the selection and implementation of security controls to protect information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
- Assist risk assessments and vulnerability assessments to identify security weaknesses and recommend mitigation strategies.
- Work with system administrators and other IT personnel to ensure security controls are properly implemented and maintained.
- Security Monitoring and Incident Response:
- Monitor information systems for security incidents and anomalies, and investigate and respond to security incidents in accordance with established procedures.
- Analyze security logs and other data sources to identify potential security threats and vulnerabilities.
- Report security incidents to the appropriate authorities, including the [Insert Organization's Incident Response Team].
- Participate in incident response exercises and drills.
- Compliance and Audit:
- Ensure that assigned information systems comply with all applicable DoD security policies, regulations, and standards, including but not limited to:
- DoD Instruction 8510.01 (Risk Management Framework for DoD Information Technology)
- NIST Special Publications (e.g., SP 800-53, SP 800-37)
- Security Technical Implementation Guides (STIGs)
- Information Assurance Vulnerability Alerts (IAVAs)
- Conduct regular security reviews and audits to verify compliance with security requirements.
- Prepare and maintain documentation to support security audits and assessments.
- Assist with the development and implementation of corrective action plans to address security deficiencies.
- System Authorization and Accreditation (A&A)
- Manage the A&A/A&A process for assigned information systems, including the preparation of security documentation (e.g., Syst
- Coordinate with authorizing officials and other stakeholders to obtain and maintain system authorizations.
- Ensure that systems are operated in accordance with their authorization.
Education, Certification & Experience Requirements:
- Active Secret Clearance
- Security CE Certification
- Bachelor's Degree in Business or IT related field with three (3) or more years of experience in Information Security, Vulnerability Management or related field. Master's Degree and 2 years of experience can be substituted.Must have relevant Air Force Risk Management Framework (RMF) experience
- Must have experience with one or more of the following:
- Experience successfully getting systems through the complete ATO process
- Vulnerability management, including running scans as well as evaluating and prioritizing the outputs
- Experience evaluating STIGs and completing STIG checklists
- Patching
- Experience using eMASS or other related tools
Knowledge, Skills & Abilities:
- Thorough Knowledge of security control selection and tailoring.
- Basic knowledge of common security controls and their purpose (e.g., access control, audit and accountability, identification and authentication).
- Familiarity with NIST SP 800-53 security controls and the various security documents that make up an ATO package (e.g., System Security Plan (SSP), Security Assessment Report (SAR), Plan of Action and Milestones (POA&M)).
- Understanding of how security controls are implemented and assessed.
- Understanding of Cloud Migration strategies and security requirements
- Strong organizational and problem-solving skills.
- Excellent communication and interpersonal skills.
- Data Center Security
- Basic Risk Management
- Compliance Auditing
- Cybersecurity Training and Awareness
- Ability to clearly and concisely document system security information
- Command Cyber Solutions, LLC is an equal opportunity employer. Command Cyber solutions, LLC does not discriminate in employment opportunities or practices on the basis of race, color, religion, sex, national origin, age, disability, marital status or any other characteristic protected by law.