Information Systems Security Officer (ISSO)

ASTRION, INC.
Eglin Air Force Base, United States of America
1 month ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Intermediate

Job location

Eglin Air Force Base, United States of America

Tech stack

Microsoft Access
Microsoft Windows
Cloud Computing Security
Configuration Management
Computer Security
Information Systems
Databases
Linux
Firmware
Networking Hardware
SAP Applications
Software Vulnerability Management
Web Applications
Vulnerability Analysis

Job description

This position provides support to the 46 Test Squadron - Sensors and Defensive Systems Flight at Eglin AFB. Working with the Information Systems Security Manager (ISSM), you will support Assessment and Authorization (A&A) activities for systems used by test engineers and data analysts. Key responsibilities include developing and maintaining security documentation (e.g., System Security Plans, Security Control Assessments, POA&Ms) to obtain and maintain system authorizations, defining information security requirements for new and existing systems, and assisting in the implementation and enforcement of security policies and standards., * Risk Management Framework (RMF) and System Authorization: Lead and implement the full lifecycle of the Assessment and Authorization (A&A) process for classified information systems, ensuring compliance with government frameworks and other relevant directives.

  • Security Control Implementation and Assessment: Implement, assess, and monitor security controls to safeguard classified networks and information.
  • Vulnerability Management and Mitigation: Perform regular vulnerability and risk assessments to identify and prioritize threats and create POA&Ms to address them.
  • Performs Security Technical Implementation Guide (STIG) assessments and Assured Compliance Assessment Solution (ACAS) scans as required.
  • Applies Secure Technical Implementation Guide (STIG) best practices to a wide range of information systems, networking equipment, and software.
  • Incident Response and Reporting: Act as a key player in incident response activities, including investigation and reporting.
  • Configuration Management and System Integrity: Provide configuration management for all security-related software, hardware, and firmware. Ensures system changes are conducted in accordance with security policy and procedures.
  • Security Documentation and Compliance: Prepare, review, and maintain all security documentation, ensuring they are current and accessible. In coordination with the ISSM, develop system-level security procedures that are consistent with cybersecurity policies. Prepares and reviews comprehensive security documentation, including System Security Plans (SSPs), Risk Assessment Reports, Plan of Action and Milestones (POA&M), network hardware and software baselines, and Authorization To Operate (ATO) packages.
  • Security Awareness and Training: Develop and provide security-related training to all personnel with access to classified systems, ensuring they are aware of their responsibilities and the latest security procedures. You will promote a culture of security awareness to minimize violations.
  • Liaison and Communication: Serve as a primary point of contact and interface with government customers, suppliers, and internal company personnel to implement protective mechanisms and ensure compliance with all cybersecurity requirements.
  • Performs other cyber security tasks as assigned.
  • Oversee system and network designs that incorporate diverse computer and network devices with varying data protection/classification requirements.
  • Interfaces with government customers and approving authorities across the DoD in an information security role.

Requirements

  • Bachelor's Degree in a technical field and 3 - 10 years of relevant experience. Additional relevant experience may substituted for education.
  • An active Secret security clearance eligibility, and the ability to obtain and maintain a Top-Secret SCI security clearance and SAP program access and will be required to handle and safeguard sensitive and/or classified information in accordance with regulations to reduce potential compromise.
  • U.S. Citizenship is required for all applicants.
  • Past DoD cybersecurity experience is required.
  • Background in Special Access Programs (SAP) Cybersecurity with demonstrated expertise with on-prem and cloud-based networks.
  • Understanding of the Risk Management Framework (RMF) lifecycle for DoW systems in a SAP environment, specifically experience in NIST 800-53 security controls and the Joint Special Access Program Implementation Guide (JSIG).
  • Knowledge of and experience designing, developing, and managing IT and cyber systems with the ability to evaluate emerging technologies and integrate them into existing architectures.
  • Knowledge of and experience planning, organizing, and directing IT activities which comply with legal, regulatory, and AF/DoW-directed requirements and meet mission and customer needs.
  • Ability to plan, organize, and lead others in studies or projects and to implement recommendations which may require substantial resources and/or require extensive procedural changes.
  • Strong project management skills with meticulous record keeping.
  • Ability to communicate effectively both orally and in writing.
  • Ability to negotiate complex issues and maintain good working relationships.
  • Experience with Security Technical Implementation Guide (STIG) assessments and Assured Compliance Assessment Solution (ACAS) scans.
  • Experience with performing Security Impact Assessments (SIA) and vulnerability analysis on system changes as a part of Configuration Management (CM)..
  • Experience in managing and responding to security incidents, supporting audits and investigations.
  • Experience with system and network designs that incorporate diverse computer and network devices with varying data protection/classification requirements.
  • Strong analytical skills in performing vulnerability/risk assessment analysis to support authorization and accreditation processes.
  • Experience with preparation and reviewing comprehensive security documentation, including System Security Plans (SSPs), Risk Assessment Reports, Plan of Action and Milestones (POA&M), network hardware and software baselines, and Authorization To Operate (ATO) packages., * Prior use of Security Compliance Checker.
  • Experience in performing security audits on systems and enclaves.
  • Experience assessing Windows and Linux operating systems, virtual systems, network devices, databases, and web applications.
  • Experience in performing Air Force software and application certification assessments.
  • Highly recommend intermediate CompTIA certs like Cybersecurity Analyst (CySA+) / SecurityX (CASP+); GIAC certs like GIAC Certified SOC Analyst (GCSA) / GIAC Certified Incident Handler (GCIH) / GIAC Certified Intrusion Analyst (GCIA); ISC2 certs like Systems Security Certified Practitioner (SSCP) / Certified Cloud Security Professional (CCSP).

Apply for this position