Information System Security Representative (ISSR) - (TS required, eligible at RedTrace Technologies Inc
Washington, District of Columbia, United States -
Full Time


Start Date

Immediate

Expiry Date

10 Mar, 26

Salary

0.0

Posted On

10 Dec, 25

Experience

10 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Information Assurance, Cybersecurity, Risk Management Framework, Vulnerability Management, Assessment And Authorization, Security Controls, Governance Risk And Compliance, System Security Plan, Interconnection Security Agreement, Security Configuration, Continuous Monitoring, Incident Response, Security Tools, Cyber Defense, Compliance Measurements, Metrics

Industry

IT Services and IT Consulting

Description
SECURITY CLEARANCE REQUIREMENT: TS, WITH SCI ELIGIBILITY This position requires onsite work ***POSITION REQUIRES US CITIZENSHIP*** Program Description: The program provides support in the areas of Cybersecurity and Management to improve the Information Assurance (IA) posture of a federal customer. The contract’s support functions are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: We are seeking an Information System Security Representative (ISSR) to carry out the following duties and responsibilities: Services to support IS Security performed by the ISSR at a minimum, shall consist of to the following activities: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS Provide liaison support between the system owner and other IS security personnel Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis Conduct required IS vulnerability scans according to risk assessment parameters. Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities Manage the risks to ISs and other agency assets by coordinating appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs) Coordinate system owner concurrence for correction or mitigation actions Monitor security controls for agency ISs to maintain security Authorized To Operate (ATO) Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase Ensure that changes to an agency IS, its environment, and/or operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM) Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR Provide baseline security controls to the system owner, contingent upon the IS’s security categorization, type of information processed and entity type Provide a recommendation to the Authorizing Official (AO), in consultation with the system owner, regarding system impact levels and IS authorization boundary Ensure that new entities are created in the GRC application with the security categorization of ISs Initiate, coordinate, and recommend to the Authorizing Official (AO) all Interconnection Security Agreement (ISAs), Memorandum of Understanding (MOUs), and Memorandum of Agreement (MOAs) that permit the interconnection of an agency IS with any non-agency or joint-use IS Perform an independent review of the System Security Plan (SSP) and make approval decisions Request and negotiate the level of testing required for an IS with the Enterprise Information Security Section and the Authorizing Official (AO) Schedule security control assessments in coordination with the system owner. Coordinate IS security inspections, tests, and reviews with the Security and system owner. Submit the final SAA package to the Authorizing Official (AO) for a security ATO decision Ensure that the Security ATO Electronic Communication (EC) is serialized into Sentinel under the applicable case file number Advise the Authorizing Official (AO) of IS vulnerabilities and residual risks. Ensure that all POA&M actions are completed and tested Coordinate initiation of an event-driven re-authorization with the Authorizing Official (AO) Ensure the removal and retirement of ISs being decommissioned, in coordination with the SO, ISSO, and ISSR Qualifications: Required: Current U.S. Government Top Secret Clearance w/ SCI and a CI-Polygraph eligibility Must be a U.S Citizen At least 7 years serving as an ISSR or related position at a cleared facility Minimum of 10 years work experience in a computer science or Cybersecurity related field Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, Network Mapper (NMAP), and/or similar applications Hold at least one of the following certifications: Certified Information Systems Security Professional (CISSP) or associate Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or other certifications exemplifying skill sets such as those described in DoD Instruction 8570.1 Information Assurance Management (IAM) Level III proficiency (CCISO, CCSP, CISM, GSLC, GCED, GCIH) Desired: A bachelor’s and/or advanced degree in computer science, business management, or IT-related discipline Employee Benefits: Competitive salary for well qualified applicants 401(k) plan Annual performance bonus Certification and advanced degree attainment bonuses Student Loan / Tuition reimbursement Health Care Insurance (medical, dental, vision) Up to four weeks of paid vacation 11 Federal Holidays, and 3 Floating Holidays Team bonding events RedTrace Technologies is an EOE employer.
Responsibilities
The ISSR will ensure the implementation and oversight of security configurations and practices for information systems. Responsibilities include conducting vulnerability scans, managing risks, and coordinating with system owners and security personnel.
Loading...