Axient is currently seeking a Senior Information Systems Security Officer (ISSO) to support our customer in Colorado Springs, CO, 80919. This requires an active TS/SCI clearance.
What you will do...Will work with Information Systems Security Manager (ISSM) to create and maintain Assessment and Authorization (A&A) documentation, including the system security plan, security control assessment, plan of action and milestones to support Authorization to Operate decisions. Capture and refine information security requirement for new systems or for enhanced functionality on existing systems. Provide support for proposing, coordinating, implementing and enforcing information systems security policies, standards and methodologies. Your talents, perspectives, and efforts will contribute directly to the safeguarding of valuable intelligence systems and data, ensuring positive mission outcomes. This position is located in Colorado Springs, Colorado and requires level of effort across multiple domains and security levels.
Support Space Systems Command (SSC), Space Sensing Tools Application & Processing (TAP) Lab in Boulder, CO and integration support to the Overhead Persistent Infrared (OPIR) Battlespace Awareness Center (OBAC) at Buckley SFB, Aurora, Colorado.
Duties to include, but are not limited to:
Ensuring the cybersecurity architecture and design of the customer’s systems are functional and secure with the ability to identify, protect, detect, respond and recover from cyber-attackDeveloping and sustaining enterprise RMF accreditation packages, from concept development and contract pre-acquisition through contractor design and accreditationExperience in Developing and Sustaining Cloud environments from concept development and contract pre-acquisition through contractor design and accreditationProviding Information System Security Operations support, integration services, technical assessments, and solutions to enable cybersecurity and DCOApplies a combination of expert engineering knowledge of security solutions to design, develop and/or implement solutions to ensure they are consistent with enterprise architecture security policies and support full spectrum military cyberspace operationsOverseeing system and network designs that encompass multiple computer and network devices to include those with differing data protections/classification requirementsDeveloping Defensive Cyberspace Operations and incident Response Tactics, Techniques and Procedures to monitor and protect the system from cyber-attacksApply Secure Technical Implementation Guide (STIG) best practices to classified and unclassified information systems, networking equipment, and applicable software/applicationsInformation Security interface to government customer and approving authorities across the DoD and Intelligence CommunitiesPerform vulnerability/risk assessment analysis to support authorization and accreditationPrepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Authorization To Operate (ATO) packages, policies and Security Controls Traceability Matrices (SCTMs)Conduct periodic reviews and evaluations of required IS policies and proceduresSupport IS Security Inspections, tests, and reviews Skills you will need...Minimum Requirements:
Education: Master’s degree in engineering or related technical field (Required). Equivalent combination of education and experience may be substituted for degree requirement. Education equivalent per contract: 12 years work experience may be substituted for a Master's Degree; OR Bachelor's Degree plus 8 years work experience may be substituted for a Master's Degree. Experience: 10+ years of experience working Information Systems Security Manager (ISSM) and creating and maintain Assessment and Authorization (A&A) documentation, including the system security plan, security control assessment, plan of action and milestones to support Authorization to Operate decisions. (Required)Valid Security+ CE Certification. Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technical Level 2. (Required)Cloud design and security experience. Highly Desired.Cyber Workforce Management Program (DoDD 8140.01 & DoD 8570.01-m) Information Assurance Management (IAM) Level II certified. Highly DesiredDemonstrated understanding of Cybersecurity Service Provider (CSSP) and DCO operations and tools. DesiredFamiliarity with Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) and system configuration validation and verification against documented security requirements. DesiredFamiliarity with cloud-based systems, operating systems, databases, networking, firewalls, Network Intrusion Detection and Prevention Systems (IDS/IPS) and host-based IDS and IPS. DesiredFamiliarity with Program Security responsibilities to include but not limited to: OPSEC, Program. Protection, Personnel Security clearances, Security Training and Education, Classification management. Desired
Security Clearance: Active Secret eligible to Top Secret with SCI eligibility
#CJ
Options APPLY HEREApplyShareEmail this job to a friendRefer <p style="margin: 0px;">We apologize, but an error occurred with Share function. Please refresh the page and try again later.</p> Share on your newsfeed Applicants for positions which require a US government security clearance or access must meet eligibility requirements that most often include US citizenship.This company is an Equal Employment Opportunity Employer as defined by the EEOC. If you are a qualified individual with a disability or are a disabled veteran, and are unable or limited in your ability to use or access our online application as a result of your disability, you have the right to receive assistance by calling us directly at 256-650-6263 or click here to reach us by email. All qualified applicants will receive consideration for employment without regard to race, color, religion or creed, national origin or ancestry, gender, age, sexual orientation, gender orientation, physical or mental disability, veteran status, genetic information, citizenship, or any other federal, state, or locally protected class.
Axient LLC is a federal government contractor and must adhere to applicable safety and legal requirements, protocols, and compliance regulations as required by federal laws and governing agencies. Application FAQs
Software Powered by iCIMS
www.icims.com