CCS Global Tech is a rapidly growing Information Technology company with a diverse portfolio of technology products and services and a large network of industry partnerships. With over 22 years of being a successful business with a global talent pool and presence, CCS is a certified Microsoft Gold Partner and specializes in delivering expert Microsoft based solutions for technical and business needs. We have been recognized by Inc. 500 Magazine as one of the fastest growing small companies in the Unites States.
we are a Tier 1 vendor for the City and County of San Francisco for Cloud Services, Staffing Services and Training Services. For this multi-year opportunity with a diverse set of needs to address, we are currently focusing on establishing partnerships with individuals as well as companies who can help us enhance our overall service portfolio, cut lead times, and ultimately help us deliver successfully. We currently hold sizable Government accounts in the San Francisco bay area including City and County of San Francisco, San Mateo County, and Santa Clara County.
We take great pride in our global reach and local influence. Your experience alongside our highly skilled and talented internal team who guide you along the way, offers key insights into what helps you stand out in a competitive job market.
If you are a partner company, please submit resumes with contact information of your own W2 Consultants only. Submitted consultants are expected to have excellent communication skills.
Role - ISSO - Level 2
Location - Fort Meade, MD
Clearance - TS/SCI FS Poly
Job Description
An ISSO is an individual responsible for ensuring that the appropriate operational security posture is maintained for an information system and, as such, works in close collaboration with the information system owner. The information system security officer also serves as a principal advisor on all matters, technical and otherwise, involving the security of an information system. The information system security officer has the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This responsibility may also include, but is not limited to, physical and environmental protection, personnel security, incident handling, and security training and awareness. The information system security officer may be called upon to assist in the development of the security policies and procedures and to ensure compliance with those policies and procedures. In close coordination with the information system owner, the information system security officer often plays an active role in the monitoring of a system and its environment of operation, including developing and updating the security plan, managing and controlling changes to the system, and assessing the security impact of those changes.
The Level 2 Information Systems Security Officer (ISSO) shall possess the following capabilities:
Familiar with and applies knowledge of National-level Security Policies to include: Intelligence Community Directive (ICD) 503, National Institute of Standards and Technology (NIST) 800 Series.
Familiar with and applies knowledge of the roles and responsibilities of the Information Technology (IT) Security Manager/Information System Security Manager (ISSM) for maintaining the appropriate operational security posture.
Prepares and maintains Certification and Authorization (C&A) documentation.
Maintains the operational security posture for an information system.
Interacts with Customers, Information Technology (IT) Staff, and Information System Security Manager (ISSM), Information Owner, Information System Owner, and Designated Authorizing Officer Official (DAO) in written and verbal communications.
Performs assigned tasks in a timely manner within an unsupervised environment.
Familiar with and applies knowledge of National-level Security Policies to include: Committee on National Security Systems (CNSS) 1253.
Support the Information System Security Manager (ISSM) in maintaining the appropriate Operational Information Assurance (IA) posture
Effectively use of COTs/GOTs Enterprise Security tools in support of continuous monitoring.
Interacts with additional resources, including the Security Control Assessor (SCA) and Information System Security Engineer (ISSE) in written and verbal communications.
Enforce the Information Security Policies, Standards, and methodologies, which include the following NIST control families: Access Control, Audit and Accountability, Configuration Management, and Incident Response
Participates in the Configuration Management process (software, hardware, and firmware). Manage and control changes to the system and assess the security impact of these changes.
Evaluates technical solutions to ensure compliance with security requirements and controls.
Required Skills
High School Diploma with 10 years of work experience in any combination of: System Administrator (SA), Information System Security Officer (ISSO), Information System Security Engineer (ISSE), Information Technology (IT) Service Desk, Computer Network Defense (CND) Analyst, Telecommunication Technician, and Network Administration.
Associate's Degree in Information Technology Discipline with 4 years of work experience in any combination of: System Administrator (SA), Information System Security Officer (ISSO), Information System Security Engineer (ISSE), Information Technology (IT) Service Desk, Computer Network Defense (CND) Analyst, Telecommunication Technician, and Network Administration
Bachelor of Science Degree in Information Technology Discipline with 2 years of work experience in any combination of: System Administrator (SA), Information System Security Officer (ISSO), Information System Security Engineer (ISSE), Information Technology (IT) Service Desk, Computer Network Defense (CND) Analyst, Telecommunication Technician, and Network Administration
Certifications: Compliance with a minimum certification of IAM Level I.
Active TS/SCI security clearance with a Full Scope polygraph is required