Skip to main content

This job has expired

You will need to login before you can apply for a job.

Information Assurance Officer/ISSO with Security Clearance

Super Systems Inc
135000.00 USD Annual
Closing date
23 Apr 2024

View more

Job Role
Information Assurance
Job Type
Duties and Responsibilities: 1. Report on and perform continuous monitoring on all AGC–supported systems and networks; identify, mitigate, and resolve cyber security incident issues and concerns
2. Develop guidelines, plans, analyses, reviews, and mitigations in the areas of security incident response and mitigation strategies, vulnerability scanning, writing security assessments, and other cybersecurity–related activities and mandates
3. Respond to all cyber security notices as directed by the Cyber Security Service Provider (CSSP) and pertinent service providers, take action to comply with security notices, and record compliance
4. Provide technical support, including documentation, to enable required AGC systems to meet the requirements of receiving an Authority to Operate (ATO) accreditation decision via the Department of Defense (DoD) Risk Management Framework (RMF)
5. Support operational cybersecurity activities, including vulnerability scanning, IAVM compliance, STIG and SRG application, assessment, and remediation, and POA&Ms
6. Support cybersecurity governance, risk, and compliance by providing plans, policies, and procedures relevant to AGC's systems, applications, and networks, including AGC GovCloud (L2), and other accredited systems and applications
7. Maintain AGC's Tenant Security Plans (TSP) for SIPR and NIPR, Authority to Operate (ATO) for JWICS and Interim Authority to Test (IATT), Approval to Connect (ATC), and any other documentation necessary to support AGC's network connections and mission systems
8. Manage the eMASS records for AGC's mission systems and enclaves, create and track POA&Ms, track IAVM and STIG compliance, and manage eMASS artifacts necessary to support evidence for applicable security controls
9. Support RMF activities, including categorization of systems IAW NIST SP 800–60, selection of security controls IAW CNSSI 1253 and NIST SP 800–53, assessment of security controls IAW NIST SP 800–53A, development and implementation of Continuous Monitoring Plans IAW NIST SP800–137, STIG Traceability Matrix, hardware/software/firmware list, and System Security Plan (SSP)
10. Participate in the configuration process through representation on the Technical Review Board (TRB) and Configuration Control Board (CCB) and provide a security impact assessment for changes submitted through Request for Change (RFCs)
11. Responsible for the reporting and analysis of continuous monitoring of AGC's systems, applications, and networks
12. Configure vulnerability scanning, analyze results, and close or mitigate findings
13. Organize the assessment of AGC GISO IT assets using applicable STIGs, SRGs, and/or vendor supply hardening guidelines. 14. Responsible for configuring AGC GISO IT assets for vulnerability scanning and ensuring 100% coverage using credentialed scans
15. Coordinate with RNEC–NCR, C5ISR, and GISA as necessary to ensure vulnerability assessment tools are in place and working properly
16. Analyze vulnerability scan results and resolve open findings; for findings that cannot be closed, create a POA&M, and recommend mitigation(s) to lessen the impact of the vulnerability; submit Operational Impact Statements (OIS) for Critical and High IAVAs.
17. Support response procedures for cybersecurity incidents, like breaches, spillage, and insider threat actions 18. Maintain all cybersecurity documentation required for accreditation for AGC's GISO assets, including but not limited to architecture diagrams, boundary diagrams, data flow diagrams, ports, protocols, services exception requests, PKI certifications, IA metrics, and Privacy Impact Assessments (PIA) in the requisite cybersecurity document repository and eMASS
19. Provide input to the weekly and monthly status report covering technical activities for this functional area, including priorities, tasks, accreditation due dates and schedules, POAM status, metrics, continuous monitoring tasks, et al.
20. Other duties as assigned Minimum Qualifications: (To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.) 1. High school diploma or GED equivalent required 2. Bachelor's or associate degree preferred; relevant experience and certification can be substituted with a degree
3. 5+ years of relevant experience with DoD in IA/Cybersecurity role
4. Active TS/SCI clearance required
5. DoD 8570 IAM II certification required
6. DoD 8570 IAM III certification preferred Knowledge, Skills, and Abilities: 1. Trained and experienced with DoD vulnerability scanning tools, including:
1. Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol Compliance Checker (SCAP), Security Technical Implementation Guide (STIG) Viewer, Endpoint Security Solution (ESS), and AWS GovCloud security tools, including AWS Security Hub, Amazon Inspector, AWS Config, Amazon GuardDuty, Amazon Detective, and Amazon Macie. 2. Possess knowledge and experience with:
1. Application and system assessment, determination of accreditation requirements (Assess Only, ATO, IATT, etc.).
2. Categorization of information systems and/or data types IAW NIST SP 800–60 Vol II
3. Establishment of Security Requirements Traceability Matrix which identifies applicable DISA STIGs and SRGs
4. Selection of security controls per NIST SP 800–53 and CNSSI 1253
5. Writing System Security Plan (SSP), associated security controls assessment artifacts, and PO&AMs
6. Application of DISA STIGs and SRGs
7. Management of security controls assessment artifacts in eMASS in preparation of packages for RMF (DoDI 8510.01, NIST SP 800–37) processes.
8. Evaluation of security controls per NIST SP 800–53A
9. Implementation of continuous monitoring solutions per NIST SP 800–137 3. Knowledge and experience with current DoD and Army IA policies and procedures, RMF certification and accreditation procedures and requirements, and APMS reporting procedures and an understanding of the unique acquisition community IA issues
4. Able to lead/oversee Program Protection Planning (PPP) and Security Classification Guide development and production for developmental and production systems
5. Knowledge and experience in the security sub–disciplines supporting Army IA, certification and accreditation, IA security testing, and security management for both developmental and production systems, including but not limited to Communications Security, Physical Security, OPSEC, Risk Assessments, Personnel Security, Tempest, Network Security, Security Inspections, and User Training
6. Must have advanced working knowledge of a variety of computer software applications in word processing, spreadsheets, database (MSWord, Excel, Access, PowerPoint), and Outlook.
7. Familiarity with Army and DoD regulations concerning IA implementation
8. Perm Placement
9. Salary: $135,000
10. Candidates must meet the min quals 11. 12. 13. High school diploma or GED equivalent required
14. Bachelor's or associate degree preferred; relevant experience and certification can be substituted with a degree
15. 5+ years of relevant experience with DoD in IA/Cybersecurity role
16. DoD 8570 IAM II certification required
17. DoD 8570 IAM III certification preferred
18. Active TS/SCI clearance required

Get job alerts

Create a job alert and receive personalised job recommendations straight to your inbox.

Create alert