Information System Security Officer (ISSO) - *Active Clearance Required* Information Technology (IT) - Sacramento, CA at Geebo

Information System Security Officer (ISSO) - *Active Clearance Required*

GENERAL JOB
Summary:
The Information System Security Officer (ISSO) serves as the principal advisor to the Information System Owner (ISO) and Information System Security Manager (ISSM) on all matters, technical and otherwise.
The ISSO will perform a classified cyber security role supporting multiple programs with working knowledge of the Risk Management Framework (RMF).
ESSENTIAL JOB FUNCTIONS:
Maintains/recommends changes of the cybersecurity program to the ISSM.
Participates in the development and implementation of security procedures.
Works with ISSM to develop operational information systems security.
Leverages guidance pertinent to all applicable directives and publications Participates in the generation and maintenance of RMF documentation.
Plays an active role in monitoring a system and its environment of operation to include developing and updating the system artifacts, managing, and controlling changes to the system and assessing the security impact of those changes, in close coordination with the ISSM.
Reviews artifacts pertinent to an information system ensuring Authorization to Operate (ATO) compliance.
Coordinates with ISSM/CPSO on approval of external information systems Maintains, per individual system and its accreditation, a baseline of configuration, hardware, software, and firmware.
Maintains, updates, and executes information system continuous monitoring plan.
Ensures data ownership and responsibilities are established for each IS and specific requirements (e.
g.
, accountability/access/special handling requirements) are enforced.
Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS.
Ensures adherence to these information system security policies and procedures.
Ensures proper procedures are followed, per the Cyber Incident Response Plan, when information system security incidents are discovered.
Disseminates appropriate documentation to all applicable personnel.
Ensures initial, annual and as needed training is accomplished and documented.
Ensures events captured are as outlined in applicable directives and publications.
Coordinates with disinterested parties to employ various intrusion attacks.
Ensures all system security-related vulnerabilities are documented and ensure serious/unresolved violations are reported to the AO/DAO Advises users on the proper operation of a specific IS as outlined in its SCTM.
Assists SAs in the approved maintenance procedures as approved by the ATO.
Provides guidance, based on component classification, before purging and release Confirms domain/local policies are configured to meet regulatory requirements.
Monitors system backup and recovery processes to ensure security features and procedures can be properly restored and are functioning correctly.
Coordinates any configuration changes of a system with the ISSM prior to the change.
Assesses changes to the system/operational needs that could affect its accreditation.
Voting/veto member of the CCB for all systems.
Assists with coordination between Kratos Security and Defense and Government authorities regarding system security posture requirements.
Participates in information system security inspections, tests, and reviews.
Ensures ISSM understands inspection timelines, operational impacts, and results.
Attends required technical and security training (e.
g.
, operating system, networking, security management) relative to assigned duties.
Maintains a working knowledge of system functions, security policies, technical security safeguards and operational security measures.
Assist with development of an effective information system security education, training, and awareness program.
Prepares audit/event reports for ISSM review, highlighting any/all anomalies.
Participates in scheduling periodic testing to evaluate the security posture of IS.
Ensures systems are operated, maintained, and disposed of according to the policies and procedures outlined in the security authorization package.
Ensures system administrators (SA) monitor all available resources that provide warnings of system vulnerabilities or ongoing attacks.
Serves as member of the configuration change board (CCB).
The ISSO shall assume ISSM responsibilities in the absence of or if no ISSM is assigned.
Assists the ISSM in meeting their duties and responsibilities.
Interfaces with internal and external customers, program managers, IT, security staff, etc.
Maintains required DoDD 8570.
01 IAM level II certifications.
Other Job Functions Provides technical guidance as a non-voting member of the configuration change board.
Serve as a member of the COMSEC Team SUPERVISORY RESPONSIBILITY:
None KNOWLEDGE, SKILLS AND ABILITIES REQUIRED:
Ability to maintain sensitive and confidential information as required by government standards.
Ability to interact effectively with peers and supervisors.
Ability to interact appropriately with the public when necessary.
Ability to adhere to workplace rules.
Ability to effectively communicate professionally in writing or verbally with all levels of personnel.
EDUCATION AND
Experience:
Must have active security clearance (within 5 years of last investigation) BS/BA in Information Technology, Computer Science 2
years of ISSO experience in a TS/SCI environment supporting a government customer or 7
years as System Administrator/Cyber Support to classified systems Must be willing and able to be SAP briefed Experience conducting vulnerability scans and interpreting results Certification level to meet DOD Directive 8570.
01-M IAM II requirements PREFERRED
Experience:
Security
or Higher Certification WORK ENVIRONMENT / PHYSICAL REQUIREMENTS:
Office and/or manufacturing environment Ability to stand and sit for long periods of time Ability to perform repetitive motion (keyboarding, 10-key, phones) Ability to lift up to 50 pounds May work extended hours or weekends and have on-call schedule/duties.
TRAVEL REQUIREMENTS:
25-50% - May be required between customer site and/or other KUAS locations.
Recommended Skills Auditing Communication Computer Security Confidentiality Firmware Information Systems Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.