Please scroll down, To apply

Information System Security Officer with Security Clearance

hiring now
New job

Powder River Industries

2024-09-20 23:37:39

Job location Washington, District of Columbia, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

Powder River Industries, LLC provides technical services across the entire system development life cycle (SDLC). As a prime, we are responsible for complete end to end system management for a customer's mission system. This includes a data center, integrated logistics support, COOP, and disaster recovery. As a subcontractor we are providing services from: DevSecOps, software development, network administration, systems analysis, database administration, storage engineering, hardware engineering, Tier 1 - Tier 3 support in traditional data center environments (bare metal frames), cloud, and hybrid cloud. The cloud environments we are operating in today are AWS, Microsoft Azure, and Oracle. Role & Responsibilities:
-Complete and maintain all certification and accreditation documentation for system ATO activities. -Manage POA&M activities related to ATO Asset where possible in completing POA&M activities.
-Ensuring the implementation of DOE and NNSA cybersecurity policies and procedures for designated information systems Conducting the Assessment and Authorization (A&A) activities for designated systems -Documenting the implementation of protection measures within the security plan for the systems -Ensuring the appropriate access is provisioned for users of designated systems.
-Work to establish and maintain Configuration Management of documentation Identifying, assessing, and documenting threats and risks to designated systems. Capturing and maintaining information system security artifacts. -Work to establish and maintain Configuration Management of documentation. -Conducting cybersecurity tests and assessments and providing results of these activities to the ISSM. -Evaluating the security impact and recommending implementation strategies for security significant changes to the assigned info Identifying cyber security training needs in terms of job responsibilities or roles. -Conducting information system risk assessments. -Responding to and reporting of incidents related to their assigned information systems. -Development of security processes and procedures to support the ISSM's Cyber Security Program. -Creating and maintaining disaster recovery and incident response plans and participating in associated training Formally and informally presents information in group and individual settings. Non-negotiable Requirements:
1. Top Secret with investigation current within the last 5 years 2. On-site, no remote Technical Environment: Microsoft, Linux, Splunk, Ansible, Tenable, GEMS All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law. In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.

Inform a friend!

<!– job description page –>
Top