Current jobs related to Isso Specialist - Lexington - Dhara Consulting Group

  • ISSO Specialist

    3 months ago


    Lexington, United States Aquila Technology Full time

    Job DescriptionJob DescriptionISSO Specialist Clearance: Top Secret with SCI Eligibility At Aquila Technology, you will see our team's passion every day, whether we are building a robust, policy-compliant IT system or stress-testing a system to identify gaps and security vulnerabilities. To own the advantage, we ensure our team owns results and gets the...


  • Lexington, Kentucky, United States Watermark Risk Management International Full time

    Job SummaryWatermark Risk Management International is seeking a highly skilled Information Systems Security Officer III to join our team. As a key member of our cybersecurity team, you will be responsible for ensuring the security posture of our information systems and collaborating with our ISSM and ISO to maintain a secure environment.Key...


  • Lexington, Kentucky, United States Targeted Solutions, LLC Full time

    Job SummaryTargeted Solutions, LLC is seeking a highly skilled Information System Security Officer to join our team. As an ISSO, you will play a critical role in ensuring the operational security posture is maintained for our information systems.Key ResponsibilitiesCollaborate with the ISSM and ISO to ensure the security posture is maintained.Manage the...


  • Lexington Park, United States Resource Management Concepts Full time

    Job SummaryWe are seeking a highly skilled Applications System Administrator to join our team at Resource Management Concepts, Inc. (RMC). As a key member of our IT team, you will be responsible for providing server and workstation support to our NAS Pax River location.Key ResponsibilitiesSupport virtual and physical server configurations, including...


  • Lexington Park, Maryland, United States Imagine One Technology & Management Ltd Full time

    Job DescriptionImagine One Technology & Management Ltd. is seeking a highly skilled Cybersecurity Specialist to join our team. As a key member of our organization, you will play a critical role in ensuring the security and integrity of our computer networks and information systems.Key Responsibilities:Plan, implement, and monitor security measures to protect...


  • Lexington Park, Maryland, United States Resource Management Concepts, Inc. Full time

    Job SummaryWe are seeking a highly skilled Applications System Administrator to join our team at Resource Management Concepts, Inc. (RMC). As a key member of our IT department, you will be responsible for providing server and workstation support to our NAS Pax River location.Key ResponsibilitiesSupport virtual and physical server configurations, ensuring...


  • Lexington Park, Maryland, United States Imagine One Technology and Management Ltd Full time

    Job Title: Information Security AnalystImagine One Technology & Management Ltd. is seeking a highly skilled Information Security Analyst to join our team. As a key member of our cybersecurity team, you will play a critical role in ensuring the security and integrity of our systems and data.Responsibilities:Plan, implement, and monitor security measures to...


  • Lexington Park, Maryland, United States Imagine One Technology and Management Ltd Full time

    Job Title: Information Security AnalystImagine One Technology & Management Ltd. is seeking an experienced Information Security Analyst to join our team. As a key member of our cybersecurity team, you will play a critical role in ensuring the security and integrity of our systems and data.Key Responsibilities:Plan, implement, and monitor security measures to...


  • Lexington, United States TEKsystems Full time

    Description: Provides technical/management leadership on major tasks or technology assignments. Establishes goals and plans that meet project objectives. Has domain and expert technical knowledge. Directs and controls activities for a client, having overall responsibility for financial management, methods, and staffing to ensure that technical requirements...

Isso Specialist

3 months ago


Lexington, United States Dhara Consulting Group Full time

Today
- Top Secret
- Unspecified
- None
- Lexington, MA** (ON-SITE/OFFICE)**

**ISSO Specialist**

**Clearance: Top Secret with SCI Eligibility**

At Aquila Technology, you will see our team's passion every day, whether we are building a robust, policy-compliant IT system or stress-testing a system to identify gaps and security vulnerabilities. To own the advantage, we ensure our team owns results and gets the work done right the first time by deploying smart, purposeful solutions that work. Aquila is the right people with the right skills driving the right outcomes. We call this the Aquila Advantage.
**About the Role**:
Aquila is seeking an **ISSO Specialist** t o join our team in supporting one of the country's premier defense research organizations.
**There are a few requirements for the position**:

- Must be a U.S Citizen (Green Cards / Visas do not qualify)
- Willingness to undergo a comprehensive background investigation and maintain a personal security clearance. (Aquila would sponsor you for the security clearance.)
- Must be within commutable distance of Lexington, Massachusetts.

**Responsibilities**:

- Develops and maintains an Information System (IS) security program and policies for an assigned area of responsibility.
- Develops and oversees operational IS security implementation policy and guidelines.
- Monitors all available resources that provide warnings of system vulnerabilities and security compliance deficiencies.
- Monitors system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
- Responsible for supporting security assessments, tests, and reviews; ensuring proper measures are taken when an IS incident or vulnerability affecting secure systems or information is discovered.
- Ensures systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the System Security Plan (SSP).
- Develops and updates the SSP, manages and controls changes to the system, and assesses the security impact of those changes.
- Ensures user activity monitoring data is analyzed, stored, and protected in accordance with the IS policies and procedures.
- Develops and maintains POA&Ms to help manage resolution of IS weaknesses, coordinate resources and timelines for corrective actions, and address mitigation actions.
- Ensures all users have the requisite security clearances and authorization and are aware of their security responsibilities. Assists in approved secure data transfer between systems.

**What You'll Bring**:

- 4 years of System Auditing
- CompTIA Security+ Certification
- Bachelor's Degree
- Currently holds a Top Secret/SCI clearance
- 4 years of Regulatory & Compliance
- 4 years of STIGs/SCAP of 4 years
- 4 years of Assessing Security Controls (CS105.16)
- 4 years of Assessment and Authorization
- 4 years of Authorizing Systems (CS106.16)
- 2 years of Categorization of the System (CS102.16)
- 4 years of Continuous Monitoring (CS200.16)
- 2 years of HBSS
- 4 years of Implementation of Controls (CS104.16)
- 4 years of Monitoring Security Controls (CS107.16)
- 2 years of NIST 800-53
- 2 years of Risk Management Framework (RMF)
- 1 year of Selecting Security Controls (CS103.16)

**Working Knowledge of the Following**:

- Assist and Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, and compliance monitoring occurs).
- Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
- Ensure that plans of action and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
- Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.
- Track audit findings and recommendations to ensure that appropriate mitigation actions are taken.
- Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements.
- Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to key stakeholders.
- Recognize a possible security violation and take appropriate action to report the incident, as required.
- Assist the Program Managers and the Information System Security Manager (ISSM) in the development and maintenance of System Security Plans (SSP) and associated artifacts such as the Plan of Action & Milestones (POA&M), Risk Assessment Report, and Continuous Monitoring Strategy.
- Ensure systems are operated, maintained, and disposed of in accordance with organization security policies and procedures.
- Lead and align information technology (IT) security priorities with the security strategy.
- Prepare for and participate in periodic organization compliance assessments. Interpret patterns of noncompliance to determ