Information Systems Security Officer (ISSO) – Skill Level 2 jobs in United States
info-icon
This job has closed.
company-logo

Kaizen Approach, Inc. · 8 hours ago

Information Systems Security Officer (ISSO) – Skill Level 2

Kaizen Approach, Inc. is seeking an Information Systems Security Officer (ISSO) to support its information assurance program. The ISSO will be responsible for implementing and enforcing security policies, evaluating security solutions, and conducting vulnerability assessments to maintain the operational security posture of information systems.

Cyber SecurityInformation TechnologyIT Management
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Support proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies
Maintaining the operational security posture of information systems or programs
Assisting with management of security aspects of information systems
Performing day-to-day security operations
Evaluating security solutions for processing classified information
Conducting vulnerability and risk assessment activities to support security authorization
Providing configuration management for information systems security software, hardware, and firmware
Managing system changes
Assessing the security impact of those changes
Preparing and reviewing security documentation such as System Security Plans, Risk Assessment Reports, Certification and Accreditation packages, and System Requirements Traceability Matrices
Supporting security authorization activities in compliance with the NIST Risk Management Framework
Providing daily oversight and direction to contractor Information Systems Security Officers
Interacting with customers, information technology staff, and high-level corporate officers to define and achieve required Cybersecurity objectives

Qualification

Information AssuranceCybersecurity PoliciesSecurity DocumentationConfiguration ManagementRisk AssessmentSecurity ToolsSecurity AuthorizationPKI ServicesCommunication ProtocolsSoft Skills

Required

Must have the ability to support a program, organization, system, or enclave's information assurance program by supporting senior Information Systems Security Officers and the Information System Security Manager in implementing, proposing, coordinating, enforcing, and ensuring compliance with information systems security policies, standards, and methodologies, while maintaining the appropriate operational Cybersecurity posture
Must possess the ability to assist with and perform the management of security aspects of information systems, including performing day-to-day security operations, maintaining the operational security posture of systems or programs, and obtaining system authorization for information systems under assigned purview
Must be capable of developing, maintaining, updating, and reviewing System Security Plans and other Cybersecurity documentation, including documentation required for security authorization in accordance with ODNI and DoD policies
Must have the ability to evaluate and assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information and to support security authorization activities
Must possess the ability to provide configuration management for security-relevant information system software, hardware, and firmware, manage and control system changes, assess the security impact of those changes, and maintain records for workstations, servers, routers, firewalls, intelligent hubs, network switches, and system upgrades
Must be capable of planning and coordinating the implementation of information technology security programs and policies, tracking and ensuring appropriate user identification and authentication mechanisms for information systems, and ensuring ongoing compliance with system security policy
Must have the ability to provide daily oversight and direction to contractor Information Systems Security Officers and to interact with customers, information technology staff, and high-level corporate officers to define and achieve required Cybersecurity objectives
Must have eight years of combined work-related experience in the fields of information technology, cybersecurity, or security authorization, or twelve years of combined work-related experience if no bachelor's degree is held, including experience in at least two areas such as current security tools, hardware and software security implementation, communication protocols, or encryption tools and techniques, and familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services
Must have a bachelor's degree in Computer Science, Cyber Security, or IT Engineering, or four additional years of work-related experience may be substituted for the degree, and must be DoD 8570 compliant with IAM I
Active TS/SCI clearance with Polygraph is required

Benefits

Premium healthcare
Financial and family support
Retirement planning
Ongoing learning
4 weeks of PTO
11 holidays
Gifted 401k
Profit sharing
Paid training

Company

Kaizen Approach, Inc.

twittertwittertwitter
company-logo
We are guided by the Japanese philosophy of kaizen, often translated as “to become good through change.” Our role is to apply this concept of ongoing improvement to two of the most significant factors in the success of an organization today: the strength of its cybersecurity and the professional development of its employees.

Funding

Current Stage
Early Stage

Leadership Team

leader-logo
Al Pickering
CEO
linkedin
leader-logo
Melissa McCoy
Chief Technology Officer
linkedin
Company data provided by crunchbase