This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The ISSO will develop, implement, and integrate cybersecurity into information systems, components, and organizational processes IAW DoD, USAF, and USSF policy.
Job Responsibility:
Participate in the development or modification of organizational cybersecurity program plans, policies, processes, procedures, and requirements
Support cybersecurity planning, assessment, risk analysis, and risk management for systems across multiple security domains
Recommend organizational and system level solutions to resolve cybersecurity requirements while maintaining system availability
Write authorization and accreditation (A&A) documentation and supporting artifacts
Interact with technical team members from multiple disciplines including performing vulnerability and compliance scanning, remediations, and system audits
Perform technical hardware & software reviews and advise leadership of changes affecting organization’s cybersecurity posture
Perform technical security assessments of complex systems
Establish and maintain cybersecurity control baseline(s) for all unit systems
Generate RMF control narratives
Requirements:
7+ years technical experience in cybersecurity or information technology with focus on cybersecurity implementations
Must meet position and certification requirements for the following DoW Cyberspace Workforce Role Code(s) and Proficiency Level(s): 722 - Information Systems Security Manager (Proficiency Level: Advanced)
462 - (Control Systems Security Specialist) (Proficiency Level: Advanced)
Firm understanding of the DoD 8500.1-M, DoDM 5205.07, Volume 1, Joint SAP Implementation Guide (JSIG), National Institute of Standards and Technology (NIST) Special Publication 800-53, Intelligence Community Directive (ICD) Number 503
Experience with eMASS, XACTA, or equivalent RMF tools
Experience with both Vulnerability and Compliance scanning tools (ACAS, Nessus Professional, SCC, Evaluate-STIG)
Experience with system security logs and associated Security Information and Event Management (SIEM) tools (Splunk, ELK stack)
Ability to work well independently as well as follow detailed instructions for completing tasks
Demonstrated ability to complete tasks, drive projects to closure, assimilate and correlate project information in a fast-paced environment with minimum guidance
Experience with both Linux- and Windows-based operating systems
Must be a team player and be able to work within all levels of a project team
Excellent time management, scheduling, and organizational skills
Demonstrated ability to shift from one project to another in a dynamic, agile work environment
Excellent oral and written communication skills and ability to clearly translate client technical needs into technical specifications
Ability to communicate technical approaches and details within small project teams, including team interactions and presentations
Familiarity with security procedures while working in a SCIF/SAPF environment
Active TS/SCI clearance
Nice to have:
Collaboratively build teams through excellent interpersonal and communication skills
Operate independently and take initiative
Cloud security
Interpreting and applying cybersecurity policy down to security control implementation on weapon systems
What we offer:
Competitive salaries
Continuing education assistance
Professional development
Multiple healthcare benefits package options
401K with employer matching
Competitive time off policy along with a federally recognized holiday schedule