ISSO

$110,000 - $120,000 yearly
  • The Resume Review - Recruiting Department
  • Washington D.C., DC, USA
  • Aug 27, 2024
Full time Information Technology

Job Description

Job description

Veteran Firm Seeking a Senior Cloud Information System Security Officer (ISSO) with Top Secret Clearance for an Onsite Assignment in Washington, DC

We are looking to fill a Senior Cloud Information System Security Officer (ISSO) role for one of our newest clients, a cyber intelligence-driven firm primarily focused on assisting the Federal Civilian, DoD, and U.S. Intelligence Communities.

The ideal candidate has 5+ years of experience serving as an Information Systems Security Officer (ISSO) at a cleared facility, a minimum of 5 years of experience in a computer science or Cybersecurity-related field, and has a current Top Secret Clearance w/ SCI and a CI-Polygraph eligibility.

If you’re interested, I'll gladly provide more details about the role and further discuss your qualifications.

 

 

Executive Summary: We are seeking a Cloud Information System Security Officer (ISSO) - Senior Level (TS required, eligible for SCI) for a role in Washington, DC.

Position Description: The program provides support in Cybersecurity and Management to improve a federal customer's Information Assurance (IA) posture. The contract’s support functions are IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.

 

Roles and Responsibilities:

  • Services to support IS Security performed by the Senior Cloud Information System Security Officer (ISSO), at a minimum, shall consist of the following activities:
  • Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS
  • Provide liaison support between the system owner and other IS security personnel
  • Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle
  • Ensure that system security documentation is developed, maintained, reviewed, and updated continuously
  • Conduct required IS vulnerability scans according to risk assessment parameters.
  • Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities
  • Manage the risks to ISs and other agency assets by coordinating appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs)
  • Coordinate system owner concurrence for correction or mitigation actions
  • Monitor security controls for agency ISs to maintain security Authorized To Operate (ATO)
  • Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase
  • Ensure that changes to an agency IS, its environment, and operational needs that may affect the authorization status are reported to the system owner and IS Security Manager (ISSM)
  • Ensure the removal and retirement of ISs being decommissioned in coordination with the system owner, ISSM, and ISSR
  • Provide baseline security controls to the system owner, contingent upon the IS’s security categorization, type of information processed, and entity type
  • Provide a recommendation to the Authorizing Official, in consultation with the system owner, regarding systems’ impact levels and ISs’ authorization boundary
  • Ensure that new entities are created in the GRC application with the security categorization of agency ISs
  • Initiate, coordinate, and recommend to the agency Authorizing Official all Interconnection Security Agreements (ISAs), Memorandum of Understanding (MOUs), and Memorandum of Agreement (MOAs) that permit the interconnection of an agency IS with any non-agency or joint-use IS
  • Perform an independent review of the System Security Plan (SSP) and make approval decisions
  • Request and negotiate the level of testing required for an IS with the Enterprise Information Security Section and the agency Authorizing Official
  • Schedule security control assessments in coordination with the system owner.
  • Coordinate IS security inspections, tests, and reviews with the Security and system owner. Submit the final SAA package to the agency Authorizing Official for a security ATO decision
  • Ensure that the Security ATO Electronic Communication (EC) is serialized into Sentinel under the applicable case file number
  • Advise the agency's authorized official on IS vulnerabilities and residual risks.
  • Ensure that all POA&M actions are completed and tested
  • Coordinate initiation of an event-driven reauthorization with the agency Authorizing Official
  • Ensure the removal and retirement of agency ISs being decommissioned in coordination with the SO, ISSM, ISSE, and ISSR