Please scroll down, To apply

ISSO with Security Clearance

hiring now
New job

InisCore Technologies

2024-09-20 08:48:09

Job location Linthicum Heights, Maryland, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

Position requires TS/SCI w/ Full-Scope Poly Clearance Job Description: Maintain the appropriate operational security posture for assigned systems, programs, and/or enclaves.
Provide guidance and technical expertise on all matters that impact or effect the security of the information system.
Assist in the development and execution of an enterprise level continuous monitoring program to minimize security risks and ensure compliance with that program on a routine basis.
Developing, updating, and submitting the System Security Plan and other required documentation that make up the Security Authorization Package.
Conduct configuration management for security-relevant changes to software, hardware, and firmware.
Perform and deliver security impact analyses of changes to the system or its environment of operation.
Assess the effectiveness of system security controls on an ongoing basis to determine system security status.
Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments.
Provides configuration management for security-relevant information system software, hardware, and firmware.
Education and Experience: 10 years of related work experience in the field of security authorization.
A Bachelor's degree in Computer Science, Information Technology Engineering, or a related field may be substituted for 4 years' experience.
DoD 8570.1 compliant IAM Level I certification, such as the CompTIA Security+ certification. A higher-level certification, such as GSLC, CAP, CASP, CISM and/or CISSP will also be accepted.
A working knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, SP800-53, etc.
Knowledge of commercial security tools and their uses.
Experience with hardware/software security implementations.
Knowledge of different communication protocols, encryption techniques/tools, and PKI and authorization services.
Familiarity with security incident management, experience collaborating with Incident Response Teams, and able to provide viable recommendations for the resolution or computer security incidents and vulnerability compliance.
Experience creating and presenting documentation and management reports.
Attendance is always critical. Must be able to work a 40-hour workweek, normally Monday through Friday. However, times and days may vary depending on business requirements. Needs to be available to work overtime during critical peaks and be available to meet last minute requests for overtime should the situation occur.
Must be able to communicate effectively both verbally and in writing.
Must put forward a professional behavior that enhances productivity and promotes teamwork and cooperation.
Must be able to interface with individuals at all levels of the organization both verbally and in writing.
Must be well-organized with the ability to coordinate and prioritize multiple tasks simultaneously. Must work well under pressure to meet deadline requirements.
Preferred: Should have experience working with the XACTA IA Manager.
Should be highly analytical and effectively able to troubleshoot and prioritize needs, requirements, and other issues.
Should be committed to continuous learning and system development because of the constant developing nature of cyber-attacks.
Should have the ability to quickly learn new concepts, data formats, and software.
Should be a self-motivated, independent, detail oriented, responsible team player, and exhibit exceptional relationship management skills.

Inform a friend!

<!– job description page –>
Top