Information Security Associate Apply
Description:
- Provide support for a program, organization, system, or enclave's information assurance program.
- Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies.
- Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
- Assist with the management of security aspects of the information system and perform day-to-day security operations of the system.
- Evaluate security solutions to ensure they meet security requirements for processing classified information.
- Perform vulnerability/risk assessment analysis to support security authorization.
- Provide Configuration Management (CM) for information systems security software, hardware, and firmware.
- Manage changes to the system and assess the security impact of those changes.
- Prepare and review documentation, including System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
- Support security authorization activities in compliance with the National Institute of Standards and Technology Risk Management Framework (NIST RMF).
Position Responsibilities:
- Provide support to senior ISSOs for implementing and enforcing information systems security policies, standards, and methodologies.
- Assist with preparation and maintenance of documentation.
- Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information.
- Assist with Configuration Management (CM) for information system security software, hardware, and firmware.
- Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc., to include system upgrades.
- Propose, coordinate, and implement information systems security policies, standards, and methodologies.
- Develop and maintain documentation for Security Authorization in accordance with ODNI and DoD policies.
- Provide CM for security-relevant information system software, hardware, and firmware.
- Ensure compliance with system security policy.
- Evaluate security solutions to ensure they meet security requirements for processing classified information.
- Maintain operational security posture for an information system or program.
- Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave.
- Develop and update the system security plan and other Cybersecurity documentation.
- Assist with the management of security aspects of the information system and perform day-to-day security operations of the system.
- Track and ensure appropriate user identification and authentication mechanisms of the Information System (IS).
- Obtain system authorization for ISs under their purview.
- Provide support for a program, organization, system, or enclave's information assurance program.
- Plan and coordinate implementation of IT security programs and policies.
- Manage and control changes to the system, assessing the security impact of those changes.
- Provide daily oversight and direction to contractor ISSOs.
- Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives.
Job Requirements:
Qualifications:
- Five (5) years of combined work-related experience in IT, cybersecurity, or security authorization.
- Experience in at least two of the following areas:
- Knowledge of current security tools.
- Hardware/software security implementation.
- Communication protocols.
- Encryption tools and techniques.
- Familiarity with commercial security products, security authorization techniques, security incident management, PKI, and authorization services.
- Compliance with DoD 8570.01-M with a minimum certification of IAM Level I.
Education/Experience:
- Bachelor's degree in Computer Science, Cyber Security, or IT Engineering.
- In lieu of a Bachelor's degree, four (4) additional years of work-related experience may be substituted.
Clearance:
- TS/SCI with FS Poly
Work Environment:
- Operates in a professional office environment.
- Routinely uses standard office equipment such as computers, phones, photocopiers, scanners, filing cabinets, and fax machines.
Physical Demands:
- Largely sedentary role with mostly sitting; however, some filing may be required.
- Ability to move files or boxes with file data, open filing cabinets, bend or stand as necessary.
- Ability to lift up to 40 lbs.
Mental Demands:
- Reading, effective verbal and written communication, maintaining emotional control and professionalism.