Information System Security Officer (ISSO) 2 102-034 with Security Clearance Information Technology (IT) - San Antonio, TX at Geebo

Information System Security Officer (ISSO) 2 102-034 with Security Clearance

Information System Security Officer (ISSO) 2:
Position Description:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISOThe position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a systemThis also will include physical and environmental protection, personnel security, incident handling, and security training and awarenessIt will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundariesThis will include assessing the security impact of those changes and making recommendation to the ISSMThe primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments effortsThe position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activitiesPerformance shall include:
o Assist the ISSM in meeting their duties and responsibilitieso Prepare, review, and update authorization packageso Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and mediao Notify ISSM when changes occur that might affect the authorization determination of the information system(s)o Conduct periodic reviews of information systems to ensure compliance with the security authorization packageo Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the changeo Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctlyo Ensure all IS security-related documentation is current and accessible to properly authorized individualso Ensure audit records are collected, reviewed, and documented (to include any anomalies)o Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned dutieso Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment planso Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for themo Prepare reports on the status of security safeguards applied to computer systemso Perform ISSO duties in support of in-house and external customerso Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundariesEducation and
Experience:
o Bachelor's degreeo 2-5 years related experience, especially in developing RMF packages or bodies of evidence; Prior performance in roles such as System/Network Administrator or ISSO; SAP experience Training and Certifications:
o DoD 8570.01-M IAM Level II (in lieu of IAT Level II) Security Clearance:
o TS SCI CI poly Recommended Skills Auditing Computer Security Configuration Management Counter Intelligence Polygraph (Ci Clearance) Firmware Information Systems Apply to this job. Think you're the perfect candidate? Apply on company site $('.external-apply-email-saved').on('click', function (event) window.ExternalApply = window.open('/interstitial?jobdid=j3n5br6zjw7sdnd0ydm', 'ExternalApply-j3n5br6zjw7sdnd0ydm'); ); $(document).ready( function() $(#ads-desktop-placeholder).html(
n
n
n Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.