Information Systems Security Officer (ISSO) Information Technology (IT) - Colorado Springs, CO at Geebo

Information Systems Security Officer (ISSO)

ECS is seeking an Information Systems Security Officer (ISSO) to work on-site in Colorado Springs.
Job Description:
ECS is seeking an experienced and highly motivated Information System Security Officer (ISSO) to work on-site and support a team responsible for ensuring cybersecurity for a cloud production network within the DoD community.
This role requires comprehensive cybersecurity understanding, DoD networks, and navigating the RMF process.
This demanding, high-energy position requires excellent customer service and communication skills.
The successful candidate can multitask; assume ownership and accountability of risks, issues, and tasks; and successfully manage and resolve those risks, issues, and tasks to completion.
The successful candidate can also work well in a team-oriented environment; self-manage his/her tasks; and provide hands-on guidance, direction, and mentoring to the technical team.
Finally, the successful candidate is exceptionally well-organized, well written, has a keen eye for detail, and can clearly articulate information (both orally and in writing) to customers, stakeholders, peers, and leadership within and external to the Program and organization.
Salary:
$140,000 - $160,000 Required Skills:
Must be a US Citizen.
Current, active Top-Secret security clearance with SCI eligibility.
A bachelor's or master's degree in Computer Science, Information Systems, Engineering, or a similar field.
May substitute 4 years' experience in lieu of degree.
Current DOD 8570 IAT Level 2 baseline certification(s) (CAP, CASP, etc.
).
A minimum of 2 years in DoD IT Security and RMF experience.
Experience performing security risk assessments and security architecture reviews Ability to demonstrate and articulate knowledge, understanding, and hands-on experience with eMASS and Xacta, ATO Process, and policy development.
Extensive experience with the Microsoft Office suite, including Project and Visio.
DoD Information Technology best practices DoD Cybersecurity best practices DODD 8500.
1, DODI 8510, and other information assurance (IA) guidance Work with the ISSM and other team members to provide ideas and solutions to ongoing project risks.
Possess excellent oral and written communication skills for large government audiences and internal executive teams.
Customer-service focused at all times and career/growth-oriented.
Ability to learn and adapt to changing information and environments.
Desired Skills:
Experience with security/validation testing tools to include vulnerability scanners (Retina, Nessus), DISA STIGs, and DISA checklists Current DOD 8570 IAT Level 3 baseline certification(s) (CISSP, CISM, etc.
).
Utilizing Agile methodologies Software Security Architecture Application Security Threat Modeling Monitoring experience Offensive or Defensive Security techniques ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis of race, color, religion, gender, age, national origin, citizenship, disability, veteran status or any other classification protected by federal, state, or local law.
ECS promotes affirmative action for minorities, women, disabled persons, and veterans.
ECS is a leading mid-sized provider of technology services to the United States Federal Government.
We are focused on people, values and purpose.
Every day, our 3000 employees focus on providing their technical talent to support the Federal Agencies and Departments of the US Government to serve, protect and defend the American People.
Recommended Skills Agile Methodology Application Security Architecture Attention To Detail Certified Information Security Manager Certified Information Systems Security Professional Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.