By Light HQ

Information Systems Security Officer, Jr.

Job Locations US-FL-Cape Canaveral
Posted Date 24 hours ago(9/24/2024 9:28 AM)
ID
2024-9704
# of Openings
1
Category
Cyber
Clearance
Tier 3 - Secret/ADP II

Company Overview

American Communications Solutions and By Light Professional IT Services are recruiting dedicated and talented IT Service and Program Management Office professionals. EWOCS provides reliable high-quality communications and innovative IT solutions for the Guardians, Airmen, and Government agencies assigned to Patrick Space Force Base, Cape Canaveral Space Force Station, and Vandenberg Air Force Base. Be a part of the team that delivers excellence in national missile defense, human space flight, space launch, and combat rescue!

Position Overview

As an ISSO, you will be responsible for developing and implementing security measures to protect our computer systems and networks as well as ensuring the appropriate operational security posture is maintained for accredited information systems (IS) in support of the Risk Management Framework (RMF) and the terms of the IS accreditation. This position works in close collaboration with Information System Security Engineers (ISSE), Information System Security Manger (ISSM), and Information System Owner (ISO). The ideal candidate should have a solid understanding of information security principles, excellent problem-solving skills, and the ability to communicate effectively with both technical and non-technical personnel.

Responsibilities

  • Develop and maintain a comprehensive information security program to safeguard the organization's data, systems, and networks.
  • Conduct regular risk assessments to identify potential security vulnerabilities and recommend appropriate countermeasures.
  • Monitor and analyze security logs and reports to identify and respond to potential security incidents.
  • Implement and enforce security policies and procedures to ensure the protection of sensitive information and assets.
  • Conduct security audits and assist with the preparation for external security assessments.
  • Coordinate incident response activities, investigate security breaches, and provide recommendations for incident mitigation.
  • Stay up-to-date with the latest information security trends, technologies, and best practices to ensure continuous improvement of the organization's security posture.
  • Validate activities and controls to assess and secure information. Evaluate gaps in security and identify solutions to mitigate risk, including business processes, technical controls and policy improvements.
  • Integrating information assurance requirements into system designs, ensuring program compliance with government requirements and obtaining an ATO.

Required Experience/Qualifications

  • 2 – 4 years in an information technology/computer related field with an emphasis on computer security.
  • Initiative driven attitude and a willingness to take on challenging tasks independently.
  • Ability to multitask and prioritize projects, appropriately manage expectations, make difficult judgment calls and communicate complex issues in an easy-to-understand format.
  • Excellent written and verbal communication skills to effectively communicate complex security matters to technical and non-technical audiences.
  • Ability to work independently and collaborate with cross-functional teams to achieve common security goals.

Preferred Experience/Qualifications

  • Bachelor's degree in Computer Science, Information Technology, or a related field. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+, etc.) is highly desired.
  • Knowledge of or experience administering accredited information systems.
  • Introductory knowledge of network administration and security practices and procedures, including routine network auditing within an enterprise class environment.
  • Experience with security related tools including ACAS (Tenable SC), Host Based Security Systems, log aggregation with Elastic and/or Splunk, and File Integrity Monitoring Software.
  • Knowledge of incident response procedures and familiarity with forensic tools is a plus.
  • Knowledge of Information Security or Information technology standards.
  • Familiarity with implementation of Government directives and policies derived from NIST, CNSSI, ICS, DoD, or other Government Regulatory compliance standards within a professional industry
  • Familiarity with the AFIC RMF tool called Xacta® 360.

Special Requirements/Security Clearance

  • Active DoD Secret Clearance with the ability to obtain and maintain a Top Secret/SCI clearance

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed