Junior Information System Security Officer Information Technology (IT) - Huntsville, AL at Geebo

Junior Information System Security Officer

Description Dynetics, a wholly owned subsidiary of Leidos, is seeking a talented Junior Information System Security Officer (ISSO) to join a diverse team to create unique solutions for complex problems.
With offices across the United States engaging in the defense, space, cyber and commercial fields, Dynetics provides responsive, cost-effective engineering, scientific and IT solutions.
The Junior Information System Security Officer (ISSO) will be responsible for supporting our Classified Information System Cybersecurity/Information Assurance Program.
The Junior ISSO will report to the Information System Security Manager (ISSM) on all aspects of classified information system security compliance in support of a Senior ISSO.
Primary
Responsibilities:
Supporting the assessing and monitoring system compliance, auditing, security plan development and delivering information systems security education and awareness Assist with investigating information system security violations and help prepare reports specifying corrective and preventative actions Support the creation, review and update of cybersecurity documentation and other technical writing Support the auditing of information systems to ensure compliance with security policies and procedures while reporting any discrepancies to the ISSM, ISO or FSO.
Assisting in the Risk Management Framework (RMF) authorization process by developing and maintaining artifacts for the IS Body of Evidence (BoE).
Reviewing Configuration Management (CM) requests of all associated hardware, software, and security relevant functions is maintained and documented as part of CCB approval process.
Assisting with sanitization and release of hardware in accordance with security policies or Authorizing Official (AO) guidance.
Testing/evaluation and application of required technical security controls and periodic inspections of information systems.
Basic
Qualifications:
Position Typically requires less than 2 years of applicable, related experience in computer-related discipline.
Additional experience may be considered in lieu of a degree.
Relevant Experience Considered:
Cybersecurity, systems security or hardening, Information Technology Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), National Industrial Security Program Operating Manual (NISPOM) Experience working with and/or supporting computer technologies (such as:
databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics) Some Experience with security configurations across multiple operating systems in various environments, to include Windows, Linux, UNIX, utilizing Active Directory/Group Policy, Centrify, etc.
is required.
Candidate must be highly organized, self-motivated with excellent documentation and time management skills and Must possess the ability to communicate well with others and work with minimal supervision.
Preferred
Qualifications:
Some Experience with IT (Windows, Linux) and/or security related certifications (Security
CE, CISSP, CISM, CISA, etc.
) is preferred.
Some Experience working in DoD classified operating and/or laboratory environments Some Experience with various information system security tools that address vulnerability analysis and mitigation.
These may include Solarwinds, Splunk, Tenable, SCAP.
Familiarity with implementation of Government directives and policies derived from NIST, STIG, DoD, or other Government Regulatory compliance standards within a professional industry Familiarity in the execution of the Assessment & Authorization processes, as defined within the Risk Managed Framework (RMF), eMASS Experience providing technical security consultation for complex, cross-domain, heterogeneous classified networked environments in collaboration with internal/external Customers, Information Technology (IT) Familiarity with the execution and management of cyber incident response; preservation, containment, and eradication Original Posting Date:
2024-02-20While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $53,950.
00 - $97,525.
00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary.
Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Original Posting Date:
02/07/2024While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Recommended Skills Business Continuity Planning Business Continuity Information Technology Infrastructure Libraries Control Objectives For Information And Related Technology (Cobit) Information Technology Infrastructure Library Mitigation Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3n13b6kl59sjrp9hxt', 'ExternalApply-j3n13b6kl59sjrp9hxt'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.