Information Systems Security Officer (ISSO) at CTC Group
Fort Meade, MD 20755, USA -
Full Time


Start Date

Immediate

Expiry Date

10 Jun, 25

Salary

75000.0

Posted On

10 May, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Security Tools, Communication Protocols, Security Implementation, Computer Science

Industry

Information Technology/IT

Description

SUMMARY

CTC Group is seeking Information Systems Security Officer (ISSO), levels 2-3, for a contingent program to provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.

REQUIREMENTS

  • Active TS/SCI with polygraph security clearance
  • Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required.
  • Four (4) years of additional experience as an ISSO may be substituted for a bachelor’s degree.
  • DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required.

LEVEL 2 QUALIFICATIONS

  • Ten (10) years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required.
  • Experience is to include at least two (2) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.

Level 3 Qualifications

  • Fifteen (15) years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required.
  • Experience is to include at least three (3) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.
Responsibilities
  • Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
  • Assist with preparation and maintenance of documentation
  • Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
  • Assist with the CM for information system security software, hardware, and firmware
  • Maintain records on workstations, servers, routers, firewalls, intelligent hubs , network switches, etc. to include system upgrades
  • Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies
  • Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
  • Provide CM for security-relevant information system software, hardware, and firmware
  • Develop system security policy and ensures compliance
  • Evaluate security solutions to ensure they meet security requirements for processing classified information (U) Maintain operational security posture for an information system or program
  • Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
  • Develop and update the system security plan and other IA documentation
  • Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
  • Administer the user identification and authentication mechanism of the Information System (IS)
  • Obtain C&A for ISs under their purview
  • Provide support for a program, organization, system, or enclave’s information assurance program
  • Plan and coordinate the IT security programs and policies
  • Manage and control changes to the system and assessing the security impact of those changes
  • Manage and control changes to the system and assessing the security impact of those changes
  • Serve as the Approval Authority for ISs under their control
Loading...