Information System Security Officer

3 weeks ago


Washington DC United States Envisioneering, Inc Full time
Information System Security Officer - (ISSO) Location Washington, DC 20375 US (Primary) Job Type Full-Time Education Bachelor's Degree How much will you travel if the job requires it? 0 - 25% Minimum Security Clearance Required TS Job Description Envisioneering, Inc
is seeking an Information Systems Security Officer (ISSO) to support an active government contract
This position will be responsible for the following:
• Lead the RMF process for assigned programs, organizations, systems, or enclaves.
• Maintain and report system's A&A status and events.
• Manage the SP for assigned systems throughout their lifecycle.
• Perform annual security reviews, annual testing of security controls, and annual testing of the contingency plan, in line with FISMA requirements.
• Manage POA&M entries and ensuring vulnerabilities are properly tracked, mitigated, and resolved.
• Assist with identification of the security control baseline set and any applicable overlays.
• Supervise the validation of security controls with the PM/ISO, SCA Liaison, PSO, and AO CSA.
• Assemble the Security Authorization Package and submit for adjudication.
• Register and maintain the system in eMASS.
• Assess the quality of security control implementation against all requirements in accordance with the approved SLCM strategy.
• Plan and perform cybersecurity testing to assess security controls and recording security control compliance status during sustainment.
• Report changes in the security posture of systems to the AO.
• Utilize the Collaboration Board in eMASS workflow for all formal coordination during the RMF process
Detailed findings will be posted in the Artifacts tab (if necessary).
• Assist the ISSMs in executing their duties and responsibilities.
• Ensure compliance with all USN, DON, and DoD cybersecurity policies.
• Ensure all users possess the requisite security clearances and awareness of their responsibilities for systems under their purview prior to being granted access.
• Ensure an incident response, business continuity, disaster recovery, as well as vulnerability and threat reporting plans and channels are in place and that team members are trained accordingly.
• Ensure relevant policy and procedural documentation is current and accessible to properly authorized individuals.
• Utilize the Collaboration Board in the eMASS workflow for all formal coordination during the RMF process
Detailed findings will be posted in the Artifacts tab (if necessary)
Assist the ISSE with the following responsibilities:
• Oversee the development and maintenance of a system's cybersecurity solutions.
• Identify AO and SCA cognizance (i.e
FAO or NAO, and FSCA or SCA) of the system as well as any specific authorization requirements such as reciprocity, cross domain, and applicable overlays to support System Categorization.
• Identify mission criticality.
• Identify and tailor the security control baseline with applicable overlays.
• Assist with development, maintenance, and tracking of the SP.
• Lead the security control implementation and testing efforts.
• Perform vulnerability-level risk assessment on the POA&M/RISK Assessment Worksheet.
• Assist with any security testing required as part of A&A or annual reviews.
• Assist in the mitigation and closure of open vulnerabilities under the system's change control process.
• Oversee cybersecurity testing to assess security controls and recording security control compliance status during the continuous monitoring phase of the lifecycle.
• Make data entries into the eMASS record and POA&M consistent with implementation results.
• Utilize the Collaboration Board in the eMASS workflow for all formal coordination during the RMF process
Detailed findings will be posted in the Artifacts tab (if necessary).
• Rework shall be documented and provided to the PSO/PMO for review
Assist the ISSM with the following responsibilities:
• Support necessary compliance activities (e.g., ensure system security configuration guidelines are followed, compliance monitoring occurs).
• Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
• Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.
• Advise senior management (e.g., CIO) on risk levels and security posture.
• Advise appropriate senior leadership or Authorizing Official of changes affecting the organization's cybersecurity posture.
• Collect and maintain data needed to meet system cybersecurity reporting.
• Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.
• Ensure security improvement actions are evaluated, validated, and implemented as required.
• Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment.
• Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s).
• Evaluate and approve development efforts to ensure that baseline security safeguards are appropriately installed.
• Identify alternative information security strategies to address organizational security objective.
• Identify information technology (IT) security program implications of new technologies or technology upgrades.
• Interpret patterns of non compliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program.
• Manage the monitoring of information security data sources to maintain organizational situational awareness.
• Oversee the information security training and awareness program.
• Participate in an information security risk assessment during the Security Assessment and Authorization process.
• Participate in the development or modification of the computer environment cybersecurity program plans and requirements.
• Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations.
• Provide system related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents.
• Recognize a possible security violation and take appropriate action to report the incident, as required.
• Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements.
• Supervise or manage protective or corrective measures when an cybersecurity incident or vulnerability is discovered.
• Track audit findings and recommendations to ensure appropriate mitigation actions are taken.
• Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.
• Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.
• Identify security requirements specific to an information technology (IT) system in all phases of the System Life Cycle.
• Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
• Assure successful implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization's mission and goals.
• Participate in the acquisition process as necessary, following appropriate supply chain risk management practices.
• Ensure all acquisitions, procurements , and outsourcing efforts address information security requirements consistent with organization goals.
• Forecast ongoing service demands and ensure security assumptions are reviewed as necessary.
• Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate.
• Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program.
• Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, and systems, and elements.
• Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance.
• Ensure that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture.
• Establish overall enterprise information security architecture (EISA) with the organization's overall security strategy.
• Evaluate cost benefit, economic, and risk analysis in decision making process.
• Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information.
• Interpret and/or approve security requirements relative to the capabilities of new information technologies.
• Lead and align information technology (IT) security priorities with the security strategy.
• Lead and oversee information security budget, staffing, and contracting.
• Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency.
• Manage threat or target analysis of cyber defense information and production of threat information within the enterprise.
• Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure they provide the intended level of protection.
• Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans.
• Provide leadership and direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literac

  • Washington, United States Information Protection Solutions Full time

    Job DescriptionJob DescriptionInformation systems security officers (ISSO) research, develop, implement, test and review an organization's information security in order to protect information and prevent unauthorized access. Officers inform users about security measures, explain potential threats, install software, implement security measures and monitor...


  • Washington, United States Watershed Security Full time

    COMPANY OVERVIEW Watershed Security is a Veteran Owned Small Business and a leader in providing quality Cyber Security Services to the Federal Government. Watershed is a great place to work, offering a challenging and respectful work environment. We are growing fast and strive to deliver our vision every day: “To inspire trust and respect with our...


  • Washington, United States Watershed Security Full time

    COMPANY OVERVIEW Watershed Security is a Veteran Owned Small Business and a leader in providing quality Cyber Security Services to the Federal Government. Watershed is a great place to work, offering a challenging and respectful work environment. We are growing fast and strive to deliver our vision every day: “To inspire trust and respect with our...


  • Washington, United States Watershed Security Full time

    Job DescriptionJob DescriptionCOMPANY OVERVIEWWatershed Security is a Veteran Owned Small Business and a leader in providing quality Cyber Security Services to the Federal Government. Watershed is a great place to work, offering a challenging and respectful work environment. We are growing fast and strive to deliver our vision every day: “To inspire trust...


  • Washington, United States TekSynap Full time

    We are seeking an Information Systems Security Officer to join our Task Order proposal on the Defense Intelligence Agency's Solutions for the Information Technology Enterprise III (SITE III). The Information Systems Security Officer will support Engi Security Officer, Security, Systems, Officer, Information Technology, Information


  • Washington, United States Information Protection Solutions Full time

    Job DescriptionJob DescriptionRESPONSIBILITYAnalyze science, engineering, business, and other data processing problems to implement and improve computer systems. Analyze user requirements, procedures, and problems to automate or improve existing systems and review computer system capabilities, workflow, and scheduling limitations. May analyze or recommend...


  • Washington, United States Creative Visions Full time

    **Senior Information System Security Officer** Washington, District of Columbia Minimum Experience **Experienced** Creative Visions is seeking a Sr. Information System Security Officer (ISSO) to support multiple federal agencies through the Continuous Diagnostic& Mitigation (CDM) Program. The CDM Program is a high-profile, high-visibility, cybersecurity...


  • Washington, United States SAIC Full time

    Job ID: 2406794 **Location**:WASHINGTON, DC, US **Date Posted**:2024-05-14 **Category**:Cyber **Subcategory**:Cybersecurity Ops **Schedule**:Full-time **Shift**:Day Job **Travel**:No **Minimum Clearance Required**:None **Clearance Level Must Be Able to Obtain**:Public Trust **Potential for Remote Work**:No **Description** SAIC is looking for an...


  • Washington, United States Gen3 Technology Consulting Full time

    About us:Gen3 Technology Consulting isan SBA-certified Woman-Owned Small Business (WOSB) providinga diverse set of technology services and solutions to federal and commercial clients. Founded in 2017, Gen3 leverages over 25 years of information technology management and leadership experience to help our clients define, plan, manage, and achieve their...


  • Washington, United States Gen3 Technology Consulting Full time

    About us:Gen3 Technology Consulting isan SBA-certified Woman-Owned Small Business (WOSB) providinga diverse set of technology services and solutions to federal and commercial clients. Founded in 2017, Gen3 leverages over 25 years of information technology management and leadership experience to help our clients define, plan, manage, and achieve their...


  • Washington, United States Omniscius Consulting Full time

    Job DescriptionJob DescriptionWe are seeking a highly experienced Senior Information System Security Officer (ISSO) to lead our information security Compliance Branch to support a homeland security customer in Washington, DC. The ideal candidate will have over 10 years of experience in managing complex systems within our Agency, demonstrating a deep...


  • Washington, United States DANASTAR Professional Services, LLC Full time

    DANASTAR is currently seeking talented, experienced Information System Security Officers (ISSO) for an exciting position supporting one of our premier clients. Our project is aimed at establishing cutting-edge techniques for network defense, identifying threats and detecting malicious activity using advanced toolsets.The ideal candidate will have hands-on...


  • Washington, United States DANASTAR Professional Services, LLC Full time

    DANASTAR is currently seeking talented, experienced Information System Security Officers (ISSO) for an exciting position supporting one of our premier clients. Our project is aimed at establishing cutting-edge techniques for network defense, identifying threats and detecting malicious activity using advanced toolsets.The ideal candidate will have hands-on...


  • Washington, United States DANASTAR Professional Services, LLC Full time

    DANASTAR is currently seeking talented, experienced Information System Security Officers (ISSO) for an exciting position supporting one of our premier clients. Our project is aimed at establishing cutting-edge techniques for network defense, identifying threats and detecting malicious activity using advanced toolsets. Is this the next step in your career...


  • Washington, United States DANASTAR Professional Services, LLC Full time

    DANASTAR is currently seeking talented, experienced Information System Security Officers (ISSO) for an exciting position supporting one of our premier clients. Our project is aimed at establishing cutting-edge techniques for network defense, identifying threats and detecting malicious activity using advanced toolsets.The ideal candidate will have hands-on...


  • Washington, United States DANASTAR Professional Services, LLC Full time

    DANASTAR is currently seeking talented, experienced Information System Security Officers (ISSO) for an exciting position supporting one of our premier clients. Our project is aimed at establishing cutting-edge techniques for network defense, identifying threats and detecting malicious activity using advanced toolsets. The ideal candidate will have hands-on...


  • Washington, United States King Cyber LLC Full time

    **Position Title**: Information Systems Security Officer (ISSO) (Mid-level) **Security Clearance**: Top Secret (verifiable in DISS) **Position Location**: United States Naval Observatory (USNO), 3450 Massachusetts Avenue NW, Washington DC, 20392-5420 (Full-Time On-Site) **Employment Status**: Independent Consultant/1099 (full-time) **Travel**:...


  • Washington, United States Axiologic Solutions Full time

    **Overview**: Based in Northern, VA, Axiologic Solutions LLC has opportunities for you to become part of our high-quality team that delivers innovative solutions to key federal clients. We are currently seeking a RMF SME/ ISSO to support our growing team. **Responsibilities**: - Reviews and comments on technical documentation to ensure compliance with...


  • Washington, United States Gen3 Technology Consulting Full time

    Job DescriptionJob DescriptionAbout us: Gen3 Technology Consulting is an SBA-certified Woman-Owned Small Business (WOSB) providing a diverse set of technology services and solutions to federal and commercial clients. Founded in 2017, Gen3 leverages over 25 years of information technology management and leadership experience to help our clients define,...


  • Washington, United States Coalfire Federal Full time

    About Coalfire: **Coalfire Federal is a market leading cybersecurity consultancy firm that provides independent and tailored advice, assessments, technical testing and a full suite of cyber engineering services to Federal agency customers.** Coalfire Federal along with its parent company, Coalfire, has an unparalleled client list with deep customer...