Information System Security Officer with Security Clearance Information Technology (IT) - Huntsville, AL at Geebo

Information System Security Officer with Security Clearance

R-00127474 Description Leidos Defense System Sector is seeking a talented Information System Security Officer (ISSO) to join a diverse team to create unique solutions for complex problems.
With offices across the United States engaging in the defense, space, cyber and commercial fields, Dynetics provides responsive, cost-effective engineering, scientific and IT solutions.
The Information System Security Officer (ISSO) will be responsible for supporting our Classified Information System Cybersecurity/information Assurance Program.
The ISSO will report to the Information System Security Manager (ISSM) on all aspects of classified information system security compliance Primary
Responsibilities:
Assessing and monitoring system compliance, auditing, security plan development and delivering information systems security education and awareness Investigating information system security violations and help prepare reports specifying corrective and preventative actions Conducting technical and administrative assessments Integrating new cybersecurity processes, procedures, and tools Support the creation, review and update of cybersecurity documentation and other technical writing The ISSO's primary duties will consist of managing the day-to-day compliance of our classified information systems by:
Auditing information systems to ensure compliance with security policies and procedures while reporting any discrepancies to the ISSM, ISO or FSO.
Assisting in the Risk Management Framework (RMF) authorization process by developing and maintaining artifacts for the IS Body of Evidence (BoE).
Reviewing and approving (within authority) Configuration Management (CM) requests of all associated hardware, software, and security relevant functions is maintained and documented as part of CCB approval process.
Assisting with sanitization and release of hardware in accordance with security policies or Authorizing Official (AO) guidance.
Testing/evaluation and application of required technical security controls and periodic inspections of information systems.
Basic
Qualifications:
Position typically requires a Bachelors Degree and at least 8 years of applicable, related experience in computer-related discipline.
Additional experience may be considered in lieu of a degree.
Relevant Experience Considered:
Cybersecurity, systems security or hardening, Information Technology Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), National Industrial Security Program Operating Manual (NISPOM) Experience working with and/or supporting computer technologies (such as:
databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics) Physical security, Project or program management, office management, senior administration, or account management Experience with security configurations across multiple operating systems in various environments, to include Windows, Linux, UNIX, utilizing Active Directory/Group Policy, Centrify, etc.
is required Candidate must be highly organized and self-motivated with excellent documentation skills and the ability to work with minimal supervision Must hold an active Secret Security Clearance with the ability to obtain a Top Secret Preferred
Qualifications:
Experience with IT (Windows, Linux) and/or security related certifications (Security
CE, CISSP, CISM, CISA, etc.
) is preferred Experience working in DoD classified operating and/or laboratory environments Experience with various information system security tools that address vulnerability analysis and mitigation.
These may include Solarwinds, Tenable, SCAP.
Familiarity with implementation of Government directives and policies derived from NIST, STIG, DoD, or other Government Regulatory compliance standards within a professional industry Experience in the execution of the Assessment & Authorization processes, as defined within the Risk Managed Framework (RMF), eMASS Experience providing technical security consultation for complex, cross-domain, heterogeneous classified networked environments in collaboration with internal/external Customers, Information Technology (IT) Familiarity with the execution and management of cyber incident response; preservation, containment, and eradication Pay Range:
Pay Range $101,400.
00 - $183,300.
00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary.
Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Original Posting Date:
01/25/2024 While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Recommended Skills Account Management Administration Assessments Auditing Business Requirements Certified Information Security Manager Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3m7ct6r9ksgq6wjw3d', 'ExternalApply-j3m7ct6r9ksgq6wjw3d'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.