You haven't searched anything yet.
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
2 - 5 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
Education:
Bachelor’s degree or equivalent experience (4 years)
Certifications:
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must be able to regularly lift up to 50 lbs.
System High values the power and strength of diverse backgrounds on the culture and performance of our company. We strive to maintain an inclusive culture to encourage each employee to bring their whole self to the mission.
Additional Information
Full Time
$85k-104k (estimate)
03/27/2024
05/26/2024
systemhigh.com
CHANTILLY, VA
50 - 100
2005
Private
R KIRK BLUBAUGH
$10M - $50M
System High provides proactive protection, cyber security and SAP support services to government agencies.
The job skills required for Information Systems Security Officer II (ISSO II) include Networking, ISO, Operating System, Information Assurance, Collaboration, Coordination, etc. Having related job skills and expertise will give you an advantage when applying to be an Information Systems Security Officer II (ISSO II). That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Information Systems Security Officer II (ISSO II). Select any job title you are interested in and start to search job requirements.
The following is the career advancement route for Information Systems Security Officer II (ISSO II) positions, which can be used as a reference in future career path planning. As an Information Systems Security Officer II (ISSO II), it can be promoted into senior positions as a Systems/Application Security Analyst, Sr. that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Information Systems Security Officer II (ISSO II). You can explore the career advancement for an Information Systems Security Officer II (ISSO II) below and select your interested title to get hiring information.