image
  • Snapboard
  • Activity
  • Reports
  • Campaign
Welcome ,
loadingbar
Loading, Please wait..!!

Information Security Associate

  • ... Posted on: Nov 21, 2024
  • ... California Creative Solutions Inc
  • ... Fort George G Meade, Maryland
  • ... Salary: Not Available
  • ... Full-time

Information Security Associate   

Job Title :

Information Security Associate

Job Type :

Full-time

Job Location :

Fort George G Meade Maryland United States

Remote :

No

Jobcon Logo Job Description :

Description:

  • Provide support for a program, organization, system, or enclave's information assurance program.
  • Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies.
  • Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
  • Assist with the management of security aspects of the information system and perform day-to-day security operations of the system.
  • Evaluate security solutions to ensure they meet security requirements for processing classified information.
  • Perform vulnerability/risk assessment analysis to support security authorization.
  • Provide Configuration Management (CM) for information systems security software, hardware, and firmware.
  • Manage changes to the system and assess the security impact of those changes.
  • Prepare and review documentation, including System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
  • Support security authorization activities in compliance with the National Institute of Standards and Technology Risk Management Framework (NIST RMF).

Position Responsibilities:

  • Provide support to senior ISSOs for implementing and enforcing information systems security policies, standards, and methodologies.
  • Assist with preparation and maintenance of documentation.
  • Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information.
  • Assist with Configuration Management (CM) for information system security software, hardware, and firmware.
  • Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc., to include system upgrades.
  • Propose, coordinate, and implement information systems security policies, standards, and methodologies.
  • Develop and maintain documentation for Security Authorization in accordance with ODNI and DoD policies.
  • Provide CM for security-relevant information system software, hardware, and firmware.
  • Ensure compliance with system security policy.
  • Evaluate security solutions to ensure they meet security requirements for processing classified information.
  • Maintain operational security posture for an information system or program.
  • Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave.
  • Develop and update the system security plan and other Cybersecurity documentation.
  • Assist with the management of security aspects of the information system and perform day-to-day security operations of the system.
  • Track and ensure appropriate user identification and authentication mechanisms of the Information System (IS).
  • Obtain system authorization for ISs under their purview.
  • Provide support for a program, organization, system, or enclave's information assurance program.
  • Plan and coordinate implementation of IT security programs and policies.
  • Manage and control changes to the system, assessing the security impact of those changes.
  • Provide daily oversight and direction to contractor ISSOs.
  • Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives.

Job Requirements:

Qualifications:

  • Five (5) years of combined work-related experience in IT, cybersecurity, or security authorization.
  • Experience in at least two of the following areas:
    • Knowledge of current security tools.
    • Hardware/software security implementation.
    • Communication protocols.
    • Encryption tools and techniques.
  • Familiarity with commercial security products, security authorization techniques, security incident management, PKI, and authorization services.
  • Compliance with DoD 8570.01-M with a minimum certification of IAM Level I.

Education/Experience:

  • Bachelor's degree in Computer Science, Cyber Security, or IT Engineering.
  • In lieu of a Bachelor's degree, four (4) additional years of work-related experience may be substituted.

Clearance:

  • TS/SCI with FS Poly

Work Environment:

  • Operates in a professional office environment.
  • Routinely uses standard office equipment such as computers, phones, photocopiers, scanners, filing cabinets, and fax machines.

Physical Demands:

  • Largely sedentary role with mostly sitting; however, some filing may be required.
  • Ability to move files or boxes with file data, open filing cabinets, bend or stand as necessary.
  • Ability to lift up to 40 lbs.

Mental Demands:

  • Reading, effective verbal and written communication, maintaining emotional control and professionalism.

Jobcon Logo Position Details

Posted:

Nov 21, 2024

Employment:

Full-time

Salary:

Not Available

Snaprecruit ID:

SD-CIE-d6f8caeb89396cff552aa74b347f2ac0edf7d5f2b69379c919dd53f1e6b79d73

City:

Fort George G Meade

Job Origin:

CIEPAL_ORGANIC_FEED

Share this job:

  • linkedin

Jobcon Logo
A job sourcing event
In Dallas Fort Worth
Aug 19, 2017 9am-6pm
All job seekers welcome!

Information Security Associate    Apply

Click on the below icons to share this job to Linkedin, Twitter!

Description:

  • Provide support for a program, organization, system, or enclave's information assurance program.
  • Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies.
  • Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
  • Assist with the management of security aspects of the information system and perform day-to-day security operations of the system.
  • Evaluate security solutions to ensure they meet security requirements for processing classified information.
  • Perform vulnerability/risk assessment analysis to support security authorization.
  • Provide Configuration Management (CM) for information systems security software, hardware, and firmware.
  • Manage changes to the system and assess the security impact of those changes.
  • Prepare and review documentation, including System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
  • Support security authorization activities in compliance with the National Institute of Standards and Technology Risk Management Framework (NIST RMF).

Position Responsibilities:

  • Provide support to senior ISSOs for implementing and enforcing information systems security policies, standards, and methodologies.
  • Assist with preparation and maintenance of documentation.
  • Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information.
  • Assist with Configuration Management (CM) for information system security software, hardware, and firmware.
  • Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc., to include system upgrades.
  • Propose, coordinate, and implement information systems security policies, standards, and methodologies.
  • Develop and maintain documentation for Security Authorization in accordance with ODNI and DoD policies.
  • Provide CM for security-relevant information system software, hardware, and firmware.
  • Ensure compliance with system security policy.
  • Evaluate security solutions to ensure they meet security requirements for processing classified information.
  • Maintain operational security posture for an information system or program.
  • Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave.
  • Develop and update the system security plan and other Cybersecurity documentation.
  • Assist with the management of security aspects of the information system and perform day-to-day security operations of the system.
  • Track and ensure appropriate user identification and authentication mechanisms of the Information System (IS).
  • Obtain system authorization for ISs under their purview.
  • Provide support for a program, organization, system, or enclave's information assurance program.
  • Plan and coordinate implementation of IT security programs and policies.
  • Manage and control changes to the system, assessing the security impact of those changes.
  • Provide daily oversight and direction to contractor ISSOs.
  • Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives.

Job Requirements:

Qualifications:

  • Five (5) years of combined work-related experience in IT, cybersecurity, or security authorization.
  • Experience in at least two of the following areas:
    • Knowledge of current security tools.
    • Hardware/software security implementation.
    • Communication protocols.
    • Encryption tools and techniques.
  • Familiarity with commercial security products, security authorization techniques, security incident management, PKI, and authorization services.
  • Compliance with DoD 8570.01-M with a minimum certification of IAM Level I.

Education/Experience:

  • Bachelor's degree in Computer Science, Cyber Security, or IT Engineering.
  • In lieu of a Bachelor's degree, four (4) additional years of work-related experience may be substituted.

Clearance:

  • TS/SCI with FS Poly

Work Environment:

  • Operates in a professional office environment.
  • Routinely uses standard office equipment such as computers, phones, photocopiers, scanners, filing cabinets, and fax machines.

Physical Demands:

  • Largely sedentary role with mostly sitting; however, some filing may be required.
  • Ability to move files or boxes with file data, open filing cabinets, bend or stand as necessary.
  • Ability to lift up to 40 lbs.

Mental Demands:

  • Reading, effective verbal and written communication, maintaining emotional control and professionalism.

Loading
Please wait..!!