Information System Security Officer/Engineer (ISSO/ISSE) at ECS Tech Inc
Fairfax, Virginia, United States -
Full Time


Start Date

Immediate

Expiry Date

16 Dec, 25

Salary

0.0

Posted On

17 Sep, 25

Experience

5 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cyber Security, Risk Assessment, Security Architecture, IAM, Security Compliance, Configuration Management, Security Awareness, Collaboration, Problem Solving, Communication, Windows Systems, Linux Systems, Vulnerability Assessment, Security Tools, DoD Best Practices, Cloud Technologies

Industry

IT Services and IT Consulting

Description
ECS is seeking an Information System Security Officer/Engineer (ISSO/ISSE) to join our IL6-P Team based in Fairfax, VA.   ECS is seeking an experienced and highly motivated Information System Security Officer/Engineer (ISSO/ISSE) as part of a team responsible for ensuring cyber security for a IL6-P production network within the DoD community. Occasional travel within the National Capital Region (i.e. Falls Church, VA and Suffolk, VA) required, as needed. This role requires comprehensive cyber security oversight and management. This is a demanding, high-energy position that requires innovative solutions to network, hardware, software and cyber security challenges, and demands excellent customer service and communication skills. The successful candidate can multitask; assume ownership and accountability of risks, issues, and tasks; and successfully manage and resolve those risks, issues, and tasks to completion.  The successful candidate is also able to work well in a team-oriented environment; self-manage tasks; and provide hands-on guidance, direction, and mentoring to the technical team. Finally, the successful candidate is extremely well-organized and has a keen eye for detail.   Responsibilities: * Security Architecture Design: Develop and implement secure information systems architectures, including networks, applications, databases, and cloud environments to protect against cybersecurity threats and risks. * Risk Assessment and Management: Conduct risk assessments to identify vulnerabilities, assess threats, and develop risk mitigation strategies to minimize security risks and ensure the security posture of information systems. * Security Tool Implementation and Management: Deploy and manage security tools and technologies, such as firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus software, SIEM (Security Information and Event Management) systems, and encryption tools to detect and prevent security incidents. * Security Testing and Evaluation: Perform security testing, including penetration testing, vulnerability assessment, code review, and security audits to identify and remediate security vulnerabilities in information systems. * Identity and Access Management (IAM): Design and implement IAM solutions, including user authentication, authorization, provisioning, de-provisioning, single sign-on (SSO), and privilege management to ensure appropriate access control and user management. * Security Compliance and Standards: Ensure organizational compliance with regulatory requirements and industry standards (e.g., GDPR, HIPAA, PCI DSS, ISO 27001) through regular assessments, audits, and adherence to security policies and procedures. * Secure Configuration Management: Implement and maintain secure configurations for operating systems, applications, network devices, and cloud services to minimize security risks and vulnerabilities. * Security Awareness and Training: Provide security awareness training to employees to promote a culture of security and compliance and keep stakeholders informed about emerging threats and security best practices. * Collaboration and Communication: Collaborate with cross-functional teams, including IT, security, compliance, and business units, to address security concerns, communicate security risks, and provide security guidance to stakeholders. * Participate in Change Control Boards (CCB) to ensure configuration/change management of cyber security-relevant software, hardware, and firmware is maintained and documented. * Analyze and interpret ACAS (Assured Compliance Assessment Solution) scan results to identify vulnerabilities, assess risk, and drive timely remediation efforts. * Other duties, as assigned. Qualifications * US Citizen. * Active DoD Secret security clearance, with the ability to obtain/maintain a DoD Top Secret clearance with SCI Indoctrination (TS/SCI). * Bachelor's degree in Computer Science; Information Systems Management; or similar Science, Technology, Engineering and Mathematics (STEM) discipline or 4 years of work experience. * Ability to work up to 2 days/week at ECS corporate offices and/or local customer sites (e.g., Fairfax, VA, Falls Church, VA, and Suffolk, VA) with additional CONUS travel
Responsibilities
The ISSO/ISSE is responsible for ensuring cybersecurity for an IL6-P production network within the DoD community. This includes developing secure architectures, conducting risk assessments, and managing security tools and compliance.
Loading...