The Kenjya-Trusant Group, LLC is seeking an Information Systems Security Officer (ISSO) Level 2 to support an existing project providing cross domain solutions over several networks at multiple levels of security.
-
Provide support for a program, organization, system, or enclave’s information assurance program.
-
Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
-
Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
-
Assist with the management of security aspects of the information system and performs day-to-day security operations of the system.
-
Evaluate security solutions to ensure they meet security requirements for processing classified information.
-
Perform vulnerability/risk assessment analysis to support certification and accreditation.
-
Provide configuration management (CM) for information system security software, hardware, and firmware.
-
Manage and control changes to system and assesses the security impact of those changes.
-
Prepare and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
-
Support security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework(NIST RMF).
-
Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
-
Assist with preparation and maintenance of documentation
-
Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
-
Assist with the CM for information system security software, hardware, and firmware
-
Maintain records on workstations, servers, routers, firewalls, intelligent hubs , network switches, etc. to include system upgrades
-
Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies
-
Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
-
Provide CM for security-relevant information system software, hardware, and firmware
-
Develop system security policy and ensures compliance
-
Maintain operational security posture for an information system or program
-
Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
-
Develop and update the system security plan and other IA documentation
-
Administer the user identification and authentication mechanism of the Information System (IS)
-
Obtain C&A for ISs under their purview
-
Plan and coordinate the IT security programs and policies
-
Serve as the Approval Authority for ISs under their control