You are viewing a preview of this job. Log in or register to view more details about this job.

Information Systems Security Officer

We support transparency, equity, and fairness in our compensation program and provide a reasonable estimate of the salary range based on data-driven market analysis for each position. While it is not typical for an individual to be hired at or near the top of the range, a reasonable estimate of the salary range for this role is $85,439-$136,677.  Individual salary within this range will be commensurate with the incumbent’s experience, unique skills and qualifications, and other relevant factors.

Summary Statement: 

Serves as Information Systems Security Officer (ISSO). Works closely with the Information System Security Manager (ISSM) to support the daily operations of the information security program.  Ensures appropriate operational security posture is maintained for local area networks (LAN), wide area networks (WAN) and multi-user stand-alone systems (MUSA).  The ISSO monitors these systems and their operational environment and must have the technical knowledge and expertise required to manage the security aspects of these systems.

 Must understand requirements for physical and environmental protection of the computer systems, personnel security rules that pertain to systems, incident handling (such as classified spills or malware), and security training and awareness. The ISSO plays an active role in monitoring a system and its environment of operation to include developing and updating the system security plan (SSP), managing and controlling changes to the system, and assessing the security impact of those changes.

Primary Responsibilities:

  • Serves as the Information Systems Security Officer (ISSO) under the Information Systems Security Manager (ISSM) Team Lead for IDA classified and unclassified systems.
  • Manages and coordinates information security monitoring, inspections and incident response.
  • Manages a formal information security / information systems security program with assistance from the ISSM Team Lead.
  • Reviews and maintains information systems security plans (SSPs) and Assessment and Authorization (A&A) in accordance with DoD mandated polices.
  • Performs audit reviews of systems comprised of multiple operating system using security information and event management (SIEM) products to track multiple events including any signs of inappropriate or unusual activity, intrusion events, data transfers, etc.  Reports any findings to the ISSM.
  • Performs recurring self-assessments on all systems under their purview to ensure compliance with documented security requirements and to detect any system level vulnerabilities. Prepares a detailed report of the findings and ensures proper protection and / or corrective measures are taken immediately or develops a Plan of Action and Milestones (POA&M) to document planned actions.
  • Supports the ISSM during on-site assessments of US Government Security Control Assessors (SCAs) to demonstrate compliance with technical configuration requirements and implementation and enforcement of written security policy.
  • Continuously updates all required system documentation, including the SSP, POA&M, Risk Assessment Report, and system component inventories.
  • Develops procedures for responding to security incidents and investigating and reporting security violations and incidents as appropriate.
  • Reviews and approves software installed on classified systems under their purview.
  • Develops and organizes annual Classified Incident Response table top exercises with ISSM Team Lead.
  • Develops, implements and enforces information security policies and procedures.
  • Assists ISSM Team Lead to perform the steps involved in the execution of the Risk Management Framework (RMF), including generation of documentation, controls compliance testing, and continuous monitoring activities for systems.
  • Develops and periodically reviews training materials and standard operating procedures covering all technical and administrative aspects of system operations.
  • Works with IT to perform an initial system assessment to ensure that required security controls are implemented and operating correctly before a system is authorized for production.
  • Works with IT to develop automated processes to assist in maintaining system compliance and documentation updates.
  • Collaborates with IT to oversee an effective change management policy and procedures for authorizing use of hardware / software on an information system.  Evaluates proposed changes against Government security requirements and recommends approval or denial based on a security impact analysis.
  • Reviews and ensures implementation of bulletins and advisories that impact the security posture of information systems covered by SSPs.
  • Reviews systems for compliance to Government requirements and provide recommendations for improvements.
  • Develops an information systems security, education, training, and awareness program.
  • Clearly communicates to all users including security personnel, IT staff, and managers the proper procedures for protecting classified information and the systems that process that information. Training prior to initial system access and periodically after includes proper system usage, physical security, data transfers, media protection etc.
  • Performs other duties as assigned.

 Minimum Qualifications:

  • Bachelor’s degree in Information Assurance/Cyber Security or similar relevant field or equivalent experience.
  • Minimum three years’ experience in a similar systems security manager or officer role.
  • Must have the following Information Assurance certifications or security training or obtain the certificates within 6 months of hire:
  • DSS NISPOM Risk Management Framework Courses
  • DOD 8570.01-M or DoD8140 certification at IAT level 2, such as Security +
  • Governance, Risk and Compliance Certification (CGRC) through (ISC)2
  • Higher-level certifications such as CISM or CISSP strongly desired.
  • Must understand the technical configurations of Windows or Linux Operating Systems (as appropriate to location) in physical and virtual environments; both preferred.
  • Knowledge of NIST security publications is highly preferred.
  • Must have the ability to read and understand event logs from Windows and/or Linux.
  • Knowledge of tools to parse logs, scan operating systems for vulnerabilities and compliance checking preferred, and required within 6 months of hire.
  • Customer service skills, including good interpersonal skills and the ability to communicate effectively with all levels of employees.
  • This position requires an Active Secret or TS/SCI to be considered.

 

U.S. Citizenship is required

Ability to obtain and maintain a security clearance is required


IDA is an equal opportunity employer committed to providing a fair recruiting process and working environment free from discrimination. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identify, national origin, disability or protected veteran status. Click here to learn more about IDA's commitment to diversity, equity, and inclusion.

IDA is committed to working with and providing reasonable accommodations to individuals with disabilities. If, because of a medical condition or disability, you need a reasonable accommodation for any part of the application process or in order to perform the essential functions of a position, please send an email to employment@ida.org and let us know the nature of your request and contact information.