Information Systems Security Officer (ISSO) II 118-095 with Security Clearance Information Technology (IT) - Colorado Springs, CO at Geebo

Information Systems Security Officer (ISSO) II 118-095 with Security Clearance

Information Systems Security Officer (ISSO) II:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISOThe position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a systemThis also will include physical and environmental protection, personnel security, incident handling, and security training and awarenessIt will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundariesThis will include assessing the security impact of those changes and making recommendation to the ISSMThe primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments effortsThe position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activitiesPerformance shall include:
o Assist the ISSM in meeting their duties and responsibilitieso Prepare, review, and update authorization packageso Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and mediao Notify ISSM when changes occur that might affect the authorization determination of the information system(s)o Conduct periodic reviews of information systems to ensure compliance with the security authorization packageo Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the changeo Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctlyo Ensure all IS security-related documentation is current and accessible to properly authorized individualso Ensure audit records are collected, reviewed, and documented (to include any anomalies)o Attend required technical and security training (e.
g.
, operating system, networking, security management) relative to assigned dutieso Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment planso Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for themo Prepare reports on the status of security safeguards applied to computer systemso Perform ISSO duties in support of in-house and external customerso Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Experience:
o 2 - 5 years related experienceo Prior performance in roles such as System, Network Administrator or ISSO Education:
o Bachelor's degree or equivalent experience (4 years) Certifications:
o Must meet position and certification requirements outlined in DoD Directive 8570.
01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire Security Clearance:
o Current Top-Secret Clearance with SCI Eligibilityo Eligibility for access to Special Access Program Informationo Willingness to submit to a Counterintelligence polygraph Other Requirements:
o Must be able to regularly lift to 50 lbs.
Recommended Skills Auditing Computer Security Configuration Management Firmware Information Assurance Information Systems Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.