Information Systems Security Officer Level 2

    • General Dynamics Information Technology
  • Annapolis Junction, MD
  • Posted 33 days ago | Updated 3 hours ago

Overview

On Site
Full Time

Skills

Certification and accreditation
Information system security
Risk management framework
Information systems
Information assurance
System security
Security operations
Risk assessment
Configuration Management
System requirements
Traceability matrix
IT risk
Switches
IT security
Software security
Computer science
Technical training
Professional services
Application development
Policies
Management
Content management
Computer hardware
Firmware
IMPACT
Documentation
Authorization
Regulatory Compliance
National Institute of Standards and Technology
Evaluation
Servers
Routers
Firewall
DoD
ISSM
Information architecture
Authentication
ISS
Communication
Encryption
Apache Flex
Innovation
Leadership
Artificial intelligence
Machine Learning (ML)
Cloud computing

Job Details

Provides support for a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing nformation systems security policies, standards,
and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).

  • Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies.
  • Assist with preparation and maintenance of documentation.
  • Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information.
  • Assist with the CM for information system security software, hardware, and firmware (U) Maintain records on workstations, servers, routers, firewalls, intelligent hubs , network switches, etc. to include system upgrades.
  • Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies.
  • Develop and maintain documentation for C&A in accordance with ODNI and DoD policies.
  • Provide CM for security-relevant information system software, hardware, and firmware.
  • Develop system security policy and ensures compliance.
  • Evaluate security solutions to ensure they meet security requirements for processing classified information.
  • Maintain operational security posture for an information system or program.
  • Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave.
  • Develop and update the system security plan and other IA documentation.
  • Assist with the management of security aspects of the information system and perform day-today security operations of the system.
  • Administer the user identification and authentication mechanism of the Information System (IS).
  • Obtain C&A for ISs under their purview.
  • Provide support for a program, organization, system, or enclave's information assurance program.
  • Plan and coordinate the IT security programs and policies.
  • Manage and control changes to the system and assessing the security impact of those changes.
  • Serve as the Approval Authority for ISs under their control.
  • Ten (10) years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required. Experience is to include at least two (2) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.
  • Bachelor's degree in Computer Science or related discipline from an
  • accredited college or university is required.
  • DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor's degree.


GDIT IS YOUR PLACE:
Full-flex work week to own your priorities at work and at home
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career
Professional growth opportunities including paid education and certifications
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays

Work Requirements

.cls-1{fill:none;stroke:#5b6670;stroke-miterlimit:10;stroke-width:2px}
Years of Experience
10 + years of related experience

* may vary based on technical training, certification(s), or degree

.cls-2{fill:none;stroke:#5b6670;stroke-miterlimit:10;stroke-width:2px}
Certification

Travel Required
None

.cls-3{fill:none;stroke:#5d666f;stroke-miterlimit:10}
Citizenship
U.S. Citizenship Required

About Our Work

We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.