ISSO Specialist (Active Top Secret Clearance Required)

Overview

On Site
$80 - $90
Contract - W2
Contract - 03 Year(s)
No Travel Required

Skills

Security+
System Security
Security Controls
Security Clearance
SSCP
SSP
Risk Management Framework
Regulatory Compliance
NIST SP 800 Series
Cyber Security
Policies and Procedures
Information Technology
RMF
GSEC
ISSM
System Auditing
CCNA-Security
STIG
SCAP
HBSS
IT Security
Continuous Monitoring
Continuous Integration
Information System Security

Job Details

Job Title:

ISSO Specialist - (Active Top Secret clearance Required)

Duration:

3+ years

Client:

Defense Research Lab

Location:

Lexington, MA 02421, United States (Onsite)

Work Location: This position is 100% onsite due to the nature of the work. This role will require 5 days/wk onsite. The role will be onsite working primarily in a closed space. This position requires flexibility to support mission needs, including occasional off-hours, and weekend work as requested by management to meet operational or inspection deadlines. This role may also involve a weekend on-call rotation as well. This may result in occasional overtime hours.

Job Overview:

Develops and maintains an IS security program and policies for an assigned area of responsibility. Develops and oversees operational IS security implementation policy and guidelines. Monitors all available resources that provide warnings of system vulnerabilities or ongoing attacks. Monitors system recovery processes to ensure security features and procedures are properly restored and functioning correctly. Responsible for security assessments, tests, and reviews; ensuring proper measures are taken when an IS incident or vulnerability affecting classified systems or information is discovered. Ensures the application of configuration management policies and procedures for authorizing the use of hardware/software are followed. Ensures systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the SSP. Develops and updates the SSP, manages and controls changes to the system, and assesses the security impact of those changes. Ensures user activity monitoring data is analyzed, stored, and protected in accordance with the ITPSO policies and procedures.Develops and maintains POA&Ms in order to identify IS weaknesses, resources and timelines for corrective actions, and mitigate actions. Ensures all users have the requisite security clearances and authorization and are aware of their security responsibilities.

Description:

  • This role is supporting Air Force Programs and client prefers candidates with mid-level experience:
  • Assist and Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).
  • Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
  • Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
  • Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.
  • Track audit findings and recommendations to ensure that appropriate mitigation actions are taken.
  • Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements.
  • Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to key stake holders. Recognize a possible security violation and take appropriate action to report the incident, as required.
  • Assist the Program Managers and the Information System Security Manager (ISSM) in the development and maintenance of System Security Plans (SSP) and associated artifacts such as the Plan of Action & Milestones (POA&M), Risk Assessment Report, and Continuous Monitoring Strategy.
  • Ensure systems are operated, maintained, and disposed of in accordance with organization security policies and procedures.
  • Conduct network, system, and application vulnerability scanning, configuration assessment, and remediation.
  • Lead and align information technology (IT) security priorities with the security strategy.
  • Prepare for and participate in periodic organization compliance assessments. Interpret patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program.

Education and Certifications:

  • BS degree is preferred but not required
  • Security Plus is the minimum 8570 certification requirement.

Other Comments:

  • A Top-Secret clearance with SCI eligibility is required. Candidate may be required to pass a CI polygraph. Candidate must participate in this.
  • Interview process will consist of a phone screen followed by an extensive zoom interview with the team members.
  • This position is 100% onsite due to the nature of the work. This role will require 5 days/wk. onsite. The role will be onsite working primarily in a closed space.
  • This position requires flexibility to support mission needs, including occasional off-hours, and weekend work as requested by management to meet operational or inspection deadlines. This role may also involve a weekend on-call rotation as well. This may result in occasional overtime hours.

Qualification

Yrs. of exp. (Response)

Must Have

Admin

System Auditing

4 years

Certification

Current DoD 8570 IAT Level II Certification (GSEC, Security+ CE, SSCP, CCNA-Security)

Yes

Experience

Regulatory & Compliance

4 years

Government Policy/Regulations

STIGs/SCAP

4 years

Security

Assessing Security Controls (CS105.16)

4 years

Assessment and Authorization

4 years

Authorizing Systems (CS106.16)

4 years

Categorization of the System (CS102.16)

4 years

Continuous Monitoring (CS200.16)

4 years

Implementation of Controls (CS104.16)

4 years

Monitoring Security Controls (CS107.16)

4 years

NIST 800-53

4 years

NIST SP 800-37

4 years

Risk Management Framework (RMF)

4 years

Selecting Security Controls (CS103.16)

4 years

Nice to Have

Degree Level

Bachelor's Degree

Yes

Security

HBSS

0 years

NIST 800-171

0 years

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.