Information System Security Officer (ISSO)other related Employment listings - Springfield, VA at Geebo

Information System Security Officer (ISSO)

GDIT is your place.
You make it your own by embracing autonomy, seizing opportunity, and being trusted to deliver your best every day.
We think.
We act.
We deliver.
There is no challenge we can't turn into opportunity.
And our work depends on TS/SCI level cleared Information Systems Security Officer (ISSO)joining our team to support our Intelligence customer in Springfield, VA.
Job Duties:
Develop and coordinate all authorization documentation associated including the Systems Categorization, Systems Security Plan, and Systems risk assessmentSupport the control assessment, reporting and monitoring processes using the Cyber Security and Assessment Management (CSAM) systemAssist the component with staying on track with Core Controls and A-123 control assessment schedulesWork with components to ensure each Risk Based Decisions (RBD's) has a current Waivers.
Coordinate with CSS Customer Liaison support, including status of the process and POASupport and document security controls tests, assist in remediation and ensure that POA are being appropriately managed.
Develop or update the Business Continuity and Contingency Plan for the component.
Assist the components with decisions that affect security of their systems and networks.
Facilitate preparations for the tri-annual Security Assessment and Authorization (SA) component's Information System.
Conduct assessments of information systems security requirements, evaluate current security posture and recommend priorities for remediation.
Review information system infrastructure and application architecture to assess security requirementsReview existing SA documentation, Security Assessment Report and security infrastructure (ie IDS, firewalls, vulnerability scan tools, etc.
)Assess NIST 800-53, Rev 4.
Control and document resultsEvaluate and strengthen standard SA DocumentationPerform and document risk assessments, analyzing security vulnerabilities, and the metrics to measure the risks associated with those vulnerabilities;Based on the risk profile of the analyzed systems, development and documentation of a Plan of Action and Milestones (POA) for mitigating those risks;Design and development of comprehensive Systems Security Plan, covering at a high level the infrastructure, policies and procedures which define the systems security profile for the analyzed systems;Development of Systems Security Users Guides specific to selected networks, desktop computers, servers and data base systems; Design, development, and validation of System Test and Evaluation (ST) reviews for new and/or legacy systems.
Review and conduct NIST-based Self Assessments, identifying any weaknesses which need to be addressed, and developing a POA for each of those weaknesses based on industry best practices.
Design and development of Initial Privacy Assessment (IPA) and Privacy Impact Assessments (PIAs) for each major Federal Government IT Systems Developing and conducting System Test and Evaluations (ST) and Independent Verification and Validation (IV) of the security profiles of Federal Government IT SystemsConduct OMB A-123 security assessments of Federal Government IT Systems.
Bachelor's Degree in Computer Science or related technical discipline, or the equivalent combination of education, technical certifications or training, and work experienceRequired Skills:
5
years' experience performing systems security assessments, preparing system security documentation, and/or performing security upgrades for live networks, desktop systems, servers, and enterprise data bases leading to successful certification and accreditation or security authorization of such systems.
5
years' experience assessing and enhancing IT systems security policies and procedures in response to the regulatory requirements associated with Federal and International standards.
5
years IT Security experience with extensive knowledge in security regulations and security assessments having developed numerous security C (or SA) and ATO on a range of systems including classified systemsStrong working knowledge with NIST Special Publications and the NIST SP 800-37 SA using CSAM systemTS/SCI clearance required and eligibility to obtain/maintain a CI Poly8570 Complaint required, at a min IAT II within 6months from hire dateCurrent certification in one or more of the following IT Security disciplines:
ISACA - Certified Information Systems Auditor (CISA)ISACA - Certified in Risk and Information Systems Control (CRISC)ISACA - Certified Information Security Manager (CISM)#Rover2022.
Estimated Salary: $20 to $28 per hour based on qualifications.

  • Type: Other
  • Company: General Dynamics Information Technology

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.