Results-oriented. An eye for detail. Thorough and meticulous. Love working as part of a team or being the leader of a team. Dedicated to security and trust. Looking to work for a great company. Do these describe you? If so, you really should apply to be our next Information Systems Security Engineer.
Title of Position:
Description of Position:
Provides support for a program, organization, system, or enclave’s information assurance program.
Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
Assists with the management of security aspects of the information system and performs day-to-day security operations of the system.
Evaluate security solutions to ensure they meet security requirements for processing classified information.
Performs vulnerability/risk assessment analysis to support certification and accreditation.
Provides configuration management (CM) for information system security software, hardware, and firmware.
Manages changes to system and assesses the security impact of those changes.
Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Assessment & Authorization (A&A) packages, and System Controls Traceability Matrices (SCTMs).
Supports security authorization activities in compliance with the NIST Risk Management Framework (RMF) and any DoD and IC tailored requirements.
Plan and coordinate the IT security programs and policies
Manage and control changes to the system and assessing the security impact of those changes
Obtain A&A for ISs under their purview
Provide support for a program, organization, system, or enclave’s IA program
Serve as the Approval Authority to validate or approve user authorization for accounts associated with systems under their control
Understand the authorization boundary of systems
Collaboration with System and Network administrators to understand and document data flow and architecture diagrams
Knowledge of security controls, the assessment and applicability to systems
Maintain operational baseline of systems under their purview
Provide ongoing Continuous Monitoring to assigned systems
Provide and validate the operational security posture of systems and ensure they are maintained
Ability to initiate the reauthorization process of a system that needs reaccreditation
Ability to decommission a system when it is no longer required
Manage risks while assigned system is in operation
Ability to acknowledge and respond to IAVAs and create liens as necessary
Ability to understand the POA&M process as well as track and closeout any outstanding liens
Perform, coordinate and document security relevant changes
Perform vulnerability assessments to ensure updates and system baseline are enforced
Recognize a possible security violation and take appropriate action to report the incident
Manage protective or corrective measure when an IA incident or vulnerability is discovered
Provide security and awareness oversight and/or training as required
Review of audit reduction tools to monitor and review systems for compliance with IA policy
Excellent written and verbal communication skills
Excellent leadership and teamwork skills
Results oriented, high energy, self-motivated
*Candidate may be required to respond to after-hours requests as required in a 24 x 7 environment
Education and Experience Required:
Ten (10) years’ experience as an ISSO on programs and contracts of similar scope, type, and complexity is required. Experience is to include at least two (2) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.
Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required.
DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor’s degree.
Required Certification: Any of the following or higher certification; Security+ with Continuing Education, Certification Authorization Professional (CAP) or Global Information Assurance Certification – Security Leadership Certificate (GSLC).
ProSync's executive team creates and expands business opportunities, recruits talented and intelligent technology professionals, and fosters a company culture that empowers ProSync professionals to shape and mold the direction of their careers and the direction of ProSync.
Employees of ProSync Technology Group, LLC and applicants for employment shall be afforded equal opportunity in all aspects of employment without regard to race, color, religion, political affiliation, national origin, disability, sex, age, or marital status.
Email Staffing@prosync.com for more specifics regarding the position.