Overview
On Site
Full Time
Skills
System Security
ISSM
Cyber Security
Information Systems
Operations Management
System Administration
Regulatory Compliance
ICD
Authorization
Risk Assessment
Documentation
Risk Management Framework
RMF
Continuous Monitoring
Vulnerability Management
Adobe AIR
Media
Information System Security
Military
IC
Integrated Circuit
Internal Communications
DoD
Information Assurance
CISM
CISSP
Security+
Security Clearance
Management
Presentations
Job Details
ManTech seeks a motivated, career and customer-oriented Information System Security Officer ISSO to join our team in the Chantilly, VA area.
A qualified ISSO will help maintain the operational security posture of assigned information systems while collaborating closely with the Information System Security Manager ISSM. Ensure that cyber security requirements are effectively integrated into information systems' operations, management, and documentation. Provide critical systems, application and infrastructure support to the customer and work with a team across multiple technical areas to include security and systems administration.
Responsibilities include, but are not limited to:
Coordinate with government information system owners and industry partners to maintain compliance with customer requirements including supporting ICD 503 Assessments and Authorizations of industry partners' systems
Support the Assessment and Authorization process by performing risk assessments, preparing and reviewing documentation in accordance with the Risk Management Framework (RMF), identify deficiencies an provide recommendations for solutions, track Plan of Action and Milestones (POA&M) through mitigation and risk acceptance, and conduct weekly, monthly, and annual Continuous Monitoring (CONMON) activities
Implement vulnerability management programs, including tracking and addressing IAVAs and security patches, accessing applicability to existing systems, and ensuring closure
Perform data transfers between air-gapped systems at varying classification levels using tools for virus and dirty word scanning in accordance with media control and data transfer policies
Assess and respond to security-related incidents, alerts, and requests to include software requests
Prepare systems and components for disposal and assist industry partners with disposal of equipment
Travel may be required up to 25% of the time CONUS
Minimum Qualifications:
Bachelor's degree and 2 or more years of relevant information system security experience
Familiarity with information system security principles
Experience with interfacing and briefing military, civilian, and contractor personnel at all levels
Knowledge of security-related IC and DoD policies, procedures and operating instructions
One of the following certifications required Information Assurance Management (IAM) Level I: CAP, GSLC, CISM, CASP, CISSP, CCISCO, Security+
Preferred Qualifications:
Experience with Insider threat is highly desired
Security Clearance Requirements:
Must have a current / active TS/SCI with Polygraph
Physical requirements:
Must be able to remain in a stationary position for more than 50% of the time
Frequently communicates with co-workers, management, and customers, which may involve
delivering presentations
Needs to occasionally move about inside the office to access file cabinets, office machinery,
etc.
A qualified ISSO will help maintain the operational security posture of assigned information systems while collaborating closely with the Information System Security Manager ISSM. Ensure that cyber security requirements are effectively integrated into information systems' operations, management, and documentation. Provide critical systems, application and infrastructure support to the customer and work with a team across multiple technical areas to include security and systems administration.
Responsibilities include, but are not limited to:
Coordinate with government information system owners and industry partners to maintain compliance with customer requirements including supporting ICD 503 Assessments and Authorizations of industry partners' systems
Support the Assessment and Authorization process by performing risk assessments, preparing and reviewing documentation in accordance with the Risk Management Framework (RMF), identify deficiencies an provide recommendations for solutions, track Plan of Action and Milestones (POA&M) through mitigation and risk acceptance, and conduct weekly, monthly, and annual Continuous Monitoring (CONMON) activities
Implement vulnerability management programs, including tracking and addressing IAVAs and security patches, accessing applicability to existing systems, and ensuring closure
Perform data transfers between air-gapped systems at varying classification levels using tools for virus and dirty word scanning in accordance with media control and data transfer policies
Assess and respond to security-related incidents, alerts, and requests to include software requests
Prepare systems and components for disposal and assist industry partners with disposal of equipment
Travel may be required up to 25% of the time CONUS
Minimum Qualifications:
Bachelor's degree and 2 or more years of relevant information system security experience
Familiarity with information system security principles
Experience with interfacing and briefing military, civilian, and contractor personnel at all levels
Knowledge of security-related IC and DoD policies, procedures and operating instructions
One of the following certifications required Information Assurance Management (IAM) Level I: CAP, GSLC, CISM, CASP, CISSP, CCISCO, Security+
Preferred Qualifications:
Experience with Insider threat is highly desired
Security Clearance Requirements:
Must have a current / active TS/SCI with Polygraph
Physical requirements:
Must be able to remain in a stationary position for more than 50% of the time
Frequently communicates with co-workers, management, and customers, which may involve
delivering presentations
Needs to occasionally move about inside the office to access file cabinets, office machinery,
etc.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.