Information Systems Security Officer
Prosync Technology Group - Fort Meade, MD

This job posting is no longer available on Prosync Technology Group. Find similar jobs:Information System Security Officer jobs - Prosync Technology Group jobs

Experience performing the specific responsibilities for an ISSO as called out in the NSA/CSS manual 130-1, Operational Information Systems Security Manual or other DOD regulatory guidance; Provided expert technical consultation on highly complex tasks; Assists and/or provides limited direction to lower-level technical personnel; Evaluates highly complex security systems according to industry best practices to safeguard internal information systems and databases; Updated any existing system security documentation; Completed and maintained the System Security Plan (SSP) for each project; Served as the POC for the certification and accreditation process for projects and any subsequent re-certification needed; Defined security requirements and subsequently reviewed complex systems to determine if they have been designed and established to comply with established standards; Experience developing and implementing new standards as necessary; Has ensured all remote and network connections met or exceeded the Information System Security Requirements; Experience administering the user identification and authentication mechanisms of the Information Systems; Experience implementing DCID 6/3, ICD 503, CNSS 1253, and/or NISPOM chapter 8 government operations manuals; The ISSO Level 3 shall be able to independently coordinate with Government managers and professional staff to ensure information system security compliance; Experience developing Concepts of Operations (CONOPS), System Security Plans (SSPs), and any additional documentation in support of Certification and Accreditation requirements; Experience ensuring proper approvals are obtained and purging procedures are followed when devices capable of storing data were prepared for release; Experience conducting analysis on the appropriate Information Systems and identifying to management, as well as the appropriate Information System Security personnel (ISSM, ISSPM), any security weaknesses and security improvements; Experience ensuring that physical and operational procedures do not compromise the Information System Security; Led investigations of security violations and breaches and recommended solutions; Provided analysis summary to management and recommended alternative courses of action as necessary; Oversaw and ensured that configuration management mechanisms were used and maintained to protect the security posture of the Information Systems; Experience coordinating with appropriate System Administrators and programmers for changes to operating systems software or application software; Experience maintaining records on Information Systems, outlining required patches/system upgrades and using the tracking system to track assigned action items; Experience preparing and reviewing documentation to include SSPs, Risk Assessment Reports, Certification and Accreditation (C&A) packages and System Requirements Traceability Matrices (SRTMs).
About this company
2 reviews