Information System Security Officer (ISSO)
JOB DESCRIPTION
Members of the ISSO team support the assessment and authorization (A&A) process for information systems. The successful candidate will have requisite cyber security experience with methods and tools used to improve the security posture of critical systems such as identifying risks, vulnerabilities, anomalies, patching, auditing, automation, security hardening, best practices, and evaluating system changes. In addition, the candidate will collaborate with developers and engineers on projects to create a secure hybrid-cloud environment.
QUALIFICATIONS
Bachelor’s degree in Cybersecurity, IT, or other related technical discipline
Minimum eight (8) years applied experience or relevant degree plus 5 years of Cybersecurity expertise with demonstrated ability to successfully shepherd IT projects of varying types through the authorization lifecycle
REQUIRED KNOWLEDGE/SKILLS
Strong verbal and written communication/cooperation within a team context
Supported control implementation assessment and reporting and monitoring processes using cyber security and assessment management systems
Understanding of perimeter controls (firewalls), access control mechanisms, and network architectures
Demonstrated essential understanding of methods for hardening operating systems (e.g., CentOS, RedHat, Windows)
Skilled with and/or demonstrated technical aptitude with vulnerability and risk assessment tools such as Elasticsearch or Splunk SIEMs, Rapid7 Nexpose, and IDS/IPS monitoring and alerting
Strong understanding of methodologies for researching and documenting software and hardware vulnerabilities
Experienced working closely with stakeholders, developers, and external teams, including customer security manages (ISSMs), organizational leadership, and key personnel
Applied experience with the customer’s assessment and authorization tracking tools
Knowledgeable regarding Common Control Provider (CCP) requirements and methodology
Demonstrated knowledge and experience with networking topologies and hardware, including commonly used/referenced network devices, IDS and IPS, etc.
Applied experience with open-source and commercial tools and systems such as nmap, Nessus, Rapid7, Splunk, Nipper, Elasticsearch, Jira, Confluence, Cisco, VMware, Citrix, or Trellix, as well as GOTS tools used by the customer
Demonstrated experience with the design and implementation of defense-in-depth solutions
Skilled in cross-team collaboration and effective communication to fulfill specific authorization requirements
Demonstrated skill documenting processes and procedures in CONOPS and system security, contingency, configuration management and other plans
Demonstrated ability to facilitate customer concurrences required for risk-based decisions, especially those requiring waivers
Experience assisting the customer with decisions impacting the security posture and compliance of their systems and networks with requirement as documented in NIST 800-53 and its revisions
Extensive familiarity with communications protocols, such as TCP/IP, UDP, HTTP/S, SSH, LDAP, etc.
Demonstrated experience with security, monitoring and auditing cloud-based technologies, products and services, such as Amazon Web Services (AWS) or Microsoft Azure
Knowledge of the customer's organization, their network systems and infrastructure, processes and procedures, and request and approval tools
Ability to work within fast-paced customer environments
DESIRED SKILLS
Experience in scripting/program languages such as Bash, PowerShell, or Python