Information System Security Officer, Journeyman jobs in United States
cer-icon
Apply on Employer Site
company-logo

Torch Technologies, Inc. · 3 hours ago

Information System Security Officer, Journeyman

Torch Technologies is a 100% employee-owned company providing superior research, development, and engineering services to the Department of Defense. The Information System Security Officer, Journeyman will be responsible for maintaining operational security, ensuring compliance with cybersecurity policies, and conducting risk assessments for information systems.

AerospaceAutomotiveComputerElectronicsInformation TechnologyNational SecurityRoboticsSoftware
check
Comp. & Benefits
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Ensure the appropriate operational security posture is maintained for the assigned IT
Ensure that all system and application deliverables meet the requirements of all DoD and Air Force Cybersecurity policies as identified in DoDI 8510.01 (29 Dec 2020), AFI 17-101 (6 Feb 2020), AFI 17-130 (13 Feb 2020), AFMAN 17-1303 (12 May 2020), Para 2.20, Attachment 2 IAT Level II as determined by the Unit Information System Security Manager (ISSM)
Perform work that involves ensuring the confidentiality, integrity, and availability of systems, networks, and data through the planning, analysis, artifact creation development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools
Support the system/application authorization and accreditation (A&A) effort, to include assessing and guiding the quality and completeness of A&A activities, tasks, and resulting artifacts mandated by governing DoD and Air Force policies (i.e., RMF)
Provide support for the configuration and artifact creation for IS and or Platform Information Technology (PIT) systems in accordance with applicable guidance for RMF accreditation
Recommend or assist in the creation of policies and procedures to ensure the reliability of and accessibility to information systems and to prevent and defend against unauthorized access to systems, networks, and data
Assist the Information System Security Manager (ISSM) with conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection needs
Conduct systems security evaluations, audits, and reviews
Work with the ISSM to create individual systems security contingency plans and disaster recovery procedures
Create and implement programs to ensure that individual IS or PIT systems, network, and data users are aware of, understand, and adhere to systems security policies and procedures created by the ISSM
Participate in network and systems design to ensure implementation of appropriate systems security policies to include artifact creation for RMF activity
Facilitate in the gathering, analysis, and preservation of evidence used in the prosecution of computer crimes and or investigations related to failure to follow security policy
Ensure the rigorous application of information security/cybersecurity policies, principles, and practices in the delivery of all IT services

Qualification

IAT Level IICISSPCISMSecurity+GSECRisk AssessmentVulnerability AssessmentPolicy CreationIncident ResponseDisaster Recovery

Required

U.S. Citizenship
3 years plus IAT Level II
OR Bachelor's degree with individual research development plus 2 years plus IAT Level II
OR Master's degree with individual research development plus 1 year plus IAT Level II
Ability to obtain and maintain a DoD Secret Clearance
In addition to the requirements in 3.10, the Cybersecurity ISSM is the primary cybersecurity technical advisor to the Authorizing Official (AO), Program Manager (PM) and Information System Owner (ISO)
DoDM 8140 Information Assurance Management Level requirements
IAM Level I (Baseline)
Suitable for entry-level positions, including ISSO
Focuses on basic knowledge and skills in information assurance
Requires certification such as Security+, GSEC, or equivalent
IAM Level II (Mid-Level)
Appropriate for mid-level positions, including ISSM
Emphasizes a deeper understanding of information assurance principles
Requires a higher-level certification, typically one of the following: CISSP, CISM, GSLC
IAM Level III (Advanced)
Geared towards senior and managerial roles
Demands an advanced understanding of information assurance and significant experience
Requires a certification such as CISSP-ISSMP, CISM, or equivalent

Benefits

ESOP participation
401(k) match and safe-harbor contribution
Medical
Dental
Vision
Life insurance
Short-term disability
Long-term disability
Flexible spending accounts
Health Saving Accounts and Health Reimbursement Accounts
EAP
Education assistance
Paid time off
Holidays

Company

Torch Technologies, Inc.

twittertwittertwitter
company-logo
Founded in October 2002, Torch is a 100% employee-owned business headquartered in Huntsville, Alabama.

Funding

Current Stage
Late Stage
Total Funding
$15.16M
2012-02-09Seed· $3.01M
2011-12-31Debt Financing· $12.15M

Leadership Team

leader-logo
Bill Roark
Co-Founder
linkedin
leader-logo
Darryl Trousdale
Senior Manager Torch Advanced VIZLAB | Co-Founder SIMVANA VR Anesthesia
linkedin
Company data provided by crunchbase