Information Systems Security Officer (Level 2)

Fort Meade, MD, USA

Security Clearance

ACTIVE:

Top Secret/SCI - Full Scope Polygraph

Salary Range

$102,000 - $120,000

About the Role

The Information Systems Security Officer (ISSO) provides support for a program, organization, system, or enclave's information assurance program.

Bullet Points
- Active TS/SCI with FS Polygraph
- Ten (10) years experience as an ISSO on programs and contracts of similar scope
- DoD 8570 compliance with IAM Level I or higher

Full Job Description
Information Systems Security Officer (ISSO) Skill Level 2 – 20866
Location: Fort Meade, MD
Clearance: Active TS/SCI with FS Polygraph

Qualifications:
- Ten (10) years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required.
- Experience is to include at least two (2) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.
- Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required.
- DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required.
- Four (4) years of additional experience as an ISSO may be substituted for a bachelor’s degree.

Additional contract or position specific required experience for this level (skills, technologies, expertise. FTEs/PCT* Information Technology:
- CWIP Yrs Experience: IAM 5+ Recommended CWIP Level: IAT 1 & IAM 2.
- Applies knowledge of IA policy, procedures, and workforce structure to develop, implement, and maintain a secure NE.
- For IA issues, typically reports to an IAM Level III (Enclave) Manager or DAA
- May report to other senior management for network operational requirements

Job Description:
The Information Systems Security Officer (ISSO) provides support for a program, organization, system, or enclave’s information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with NSA/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF).

Capabilities:
- Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
- Assist with preparation and maintenance of documentation
- Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
- Assist with the CM for information system security software, hardware, and firmware
-Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
- Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies
- Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
- Provide CM for security-relevant information system software, hardware, and firmware
- Develop system security policy and ensures compliance
- Evaluate security solutions to ensure they meet security requirements for processing classified information
- Maintain operational security posture for an information system or program
- Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
- Develop and update the system security plan and other IA documentation
- Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
- Administer the user identification and authentication mechanism of the Information System (IS)
- Obtain C&A for ISs under their purview
- Provide support for a program, organization, system, or enclave’s information assurance program
- Plan and coordinate the IT security programs and policies
- Manage and control changes to the system and assessing the security impact of those changes
- Serve as the Approval Authority for ISs under their control