logo

View all jobs

Mid-Sr Information System Security Officer (ISSO)

Hanover, MD · Information Technology

Why Work at SI?
Secure Innovations (SI) successfully and continuously strives to become experts in the Cybersecurity field by only focusing on Cyber!  Because of this, we proudly stand behind our motto, "We're Not Standard Cyber. We're the Cyber Standard."

SI was built on the principle that people matter first and foremost.  Our focus is on PEOPLE - our employees and our customers.  SI believes in providing a strong work/life balance by investing in our employees and encouraging professional and personal growth.  We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals.

Required Experience:
Clearance: 
Active TS/SCI w/ FSP
Education: Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required.
Certification: DoD 8570 compliance with Information Assurance Management (1AM) Level I or higher is required
5-10 years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required. Experience is to include at least three (3) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques /tools. 
Four (4) years of additional experience as an ISSO may be substituted for a Bachelor's degree

Daily ISSO responsibilities would include:

  • Providing support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
  • Maintaining operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
  • Assisting with the management of security aspects of the information system and performs day-to-day security operations of the system.
  • Evaluating security solutions to ensure they meet security requirements for processing classified information.
  • Performing vulnerability /risk assessment analysis to support certification and accreditation.
  • Providing configuration management (CM) for information system security software, hardware, and firmware.
  • Managing changes to system and assesses the security impact of those changes.
  • Preparing and reviewing documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
  • Supporting security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).

Share This Job

Powered by