Senior Information Systems Security Officer (ISSO) with Security Clearanceother related Employment listings - Fort George G Meade, MD at Geebo

Senior Information Systems Security Officer (ISSO) with Security Clearance

Senior Information Systems Security Officer (ISSO) Job Category:
Security Time Type:
Full time Minimum Clearance Required to Start:
TS/SCI with Polygraph Employee Type:
Regular Percentage of Travel Required:
None Type of Travel:
None What You''ll Get to Do:
Provides support for a program, organization, system, or enclave''s information assurance program.
Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
Assists with the management of security aspects of the information system and performs day-to-day security operations of the system.
Evaluate security solutions to ensure they meet security requirements for processing classified information.
Performs vulnerability/risk assessment analysis to support certification and accreditation.
Provides configuration management (CM) for information system security software, hardware, and firmware.
Manages changes to system and assesses the security impact of those changes.
Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
Supports security authorization activities in compliance with NSA/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF).
More About the Role:
Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies Assist with preparation and maintenance of documentation Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information Assist with the CM for information system security software, hardware, and firmware Maintain records on workstations, servers, routers, firewalls, intelligent hubs , network switches, etc.
to include system upgrades Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies Develop and maintain documentation for C&A in accordance with ODNI and DoD policies Provide CM for security-relevant information system software, hardware, and firmware Develop system security policy and ensures compliance Evaluate security solutions to ensure they meet security requirements for processing classified information Maintain operational security posture for an information system or program Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave Develop and update the system security plan and other IA documentation Assist with the management of security aspects of the information system and perform day-today security operations of the system Administer the user identification and authentication mechanism of the Information System (IS) Obtain C&A for ISs under their purview Provide support for a program, organization, system, or enclave''s information assurance program Plan and coordinate the IT security programs and policies Manage and control changes to the system and assessing the security impact of those changes Manage and control changes to the system and assessing the security impact of those changes Serve as the Approval Authority for ISs under their control You''ll Bring These
Qualifications:
Ten (10) years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required.
Bachelor''s degree in Computer Science or related discipline from an accredited college or university is required.
DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required.
Four (4) years of additional experience as an ISSO may be substituted for a bachelor''s degree.
Experience is to include at least two (2) of the following areas:
knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.
Nice to have experience with:
CWIP Yrs
Experience:
IAM 5
Recommended CWIP Level:
IAT 1 & IAM 2 Applies knowledge of IA policy, procedures, and workforce structure to develop, implement, and maintain a secure NE.
For IA issues, typically reports to an IAM Level III (Enclave) Manager or DAA.
May report to other senior management for network operational requirements What We Can Offer You:
- We''ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation''s highest priorities.
- For over 55 years, the principles of CACI''s unique, character-based culture have been the driving force behind our success.
Company Overview:
At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers.
CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.
As a federal contractor, CACI is subject to any federal vaccine mandates or other customer vaccination requirements.
All new hires are required to report their vaccination status.
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.