Skip to main content

This job has expired

You will need to login before you can apply for a job.

Cyber Security Policy Administrator/ISSO with Security Clearance

TEKsystems c/o Allegis Group
Closing date
30 Apr 2024

View more

Job Role
Cyber Security Consultant
Job Type
Top Skills' Details
Previous experience is required along with experience working with eMASS. Education requirements are a Masters degree yrs of working experience or Bachelors degree rs of working experience. Active Security Clearance is required along with a Sec+ and IAM Level 2 Certification This position will require relocation and will sit on–site in the Radford location as SIPR access is necessary • Mid to senior level Cybersecurity Policy Administrator experience in an Army environment
• DoD 8570.01–M IAM level II certification is required.
• Resource must possess Baseline certification as defined in DoD Instruction 8570.01–M.
• eMASS experience required.
• Strong verbal and written communication skills
• Experience effectively managing large–scale projects.
• Experience automating routine administrative tasks desired.
• Understanding of network, storage, server, and application technologies
• Strong knowledge of DoD STIGs, and IA Vulnerability Management (IAVM)
Secondary Skills – Nice to Haves
Job Description We are supporting a premier technology service provider that delivers military–strength data security, innovative solutions, and a best–in–class customer support experience to enable mission readiness and success for the most critical applications. The enterprise data centers serve millions of users around the world, supporting system environment needs for organizations throughout the Joint Forces, Department of Defense, and Army. This datacenter supports over 150K users in the US Army and hosts over 80 applications for the departments of the US Army. JOB DUTIES:
• Serve as subject matter expert on Cybersecurity Policy Administration.
• Work within Enterprise Mission Assurance Support Service (eMASS) to add and update documentation, import ACAS and STIG files, work with POA&Ms, and all other aspects of eMASS management.
• Work between technical and policy teams to implement, maintain, and monitor technical security configuration controls, including: STIGs, SRGs, and other industry security hardening guidance.
• Work between technical and policy teams to successfully implement and manage requirements for maintaining ATO and security control inheritance capabilities.
• Collaborate with internal and external parties to transform high–level technical objectives into comprehensive technical requirements.
• Act as the ISSO for hosted systems, assuming the responsibilities as outlined in AR 25–2.
• Assist hosted customers with RMF 2.0, continuous monitoring and other audits or certifications as required.
• Update and/or assist the hosted system's personnel in updating artifacts of the authorization package and store the artifacts in organizationally defined repository; i.e., system diagram (logical and physical) Hardware/Software/Firmware Inventory, Interface & Ports, Protocols and Services listing, etc.
• Assist in the preparation of network infrastructure specifications or designs incorporating required information security features.
• Review and evaluate Information Systems Design Plans, Continuity of Operation Plans, Communication Plans, engineering change proposals and configuration changes for compliance with relevant security regulations, policies, and best industry practice.
• Interact with the Army CSSP and customer ISSMs on a regular basis.
Additional Skills & Qualifications
Security Clearance: DOD Secret (Fully Adjudicated), as a minimum Citizenship: US Required Certifications:
1. CompTIA Security+
2. DoD 8570.01–M IAM level II certification

Get job alerts

Create a job alert and receive personalised job recommendations straight to your inbox.

Create alert