Information Systems Security Officer for federal programs, managing security and compliance in IT. Assessing risks and delivering training to enhance cybersecurity practices.
Responsibilities
Perform duties and responsibilities of an ISSO for networks when required.
Support in the duties and responsibilities of managing the Common Configuration Control Board (CCB) process.
Monitor and analyze security logs and alerts to detect and respond to security incidents in a timely manner.
Assess and audit security systems, including firewalls, intrusion detection systems, and access control systems.
Support in the continuous monitoring of security controls and vulnerabilities.
Conduct regular risk assessments and vulnerability assessments to identify potential security threats and vulnerabilities.
Maintain accurate and up-to-date records of RMF documentation, security assessment reports, Plans of Actions and Milestones (POA&Ms), and other relevant documents and uploaded into eMASS IAW DOW frequency requirements.
Complete Security controls Revalidations for all authorizations within a 2-year period.
Assist in authoring and editing Cybersecurity related documents such as ISA, CCB, CIE, MFR or other reports as assigned.
Develop and deliver security awareness and training programs for all employees, contractors, and other stakeholders about cybersecurity, foster a culture of security within the organization, and reduce the risk of security incidents.
Develop, update, and maintain internal IA continuity guides for the Cybersecurity program. Guides should encompass all aspects of task execution, including processes, procedures, and best practices.
Requirements
Bachelor's Degree and a minimum of 5 years of IT or cybersecurity management experience including security practices, risk management, and compliance.
Minimum of 3 years of IT or cybersecurity experience in roles such as System Administrator, Network Administrator, Information Systems Security Officer (ISSO) or other related roles.
Minimum 3 years of Linux (RHEL) administration experience
Experience with security tools and technologies used for monitoring and protecting information systems.
Strong understanding of cybersecurity principles, practices, and standards.
At a minimum, possession of DoD Directive 8570/8140 Information Assurance Technical or Manager Level I certification.
DISA ACAS Training/Certified
Active, in-scope US Government issued Top Secret clearance.
IT Consultant specializing in Security Engineering, working on national and international IT Security projects. Responsible for identifying security vulnerabilities and assisting customers' Security Management.
IT Info Security Specialist managing ERIE's information security program to protect digital assets. Collaborating with various teams to enforce security measures and resolve identity access issues.
CISA Auditor Cyber Security at an international bank, planning and conducting IT audit examinations, focusing on cyber threats. Requires IT auditing experience and a Master in Information Systems or Engineering.
Security Engineer responsible for managing cyber risk remediation measures at Tiime startup in Paris. Collaborating with product teams to ensure application security and risk evaluation.
Cybersecurity Engineer managing complex IT environments and providing support for clients. Involved in cloud, cybersecurity, and managed services within a dynamic startup environment.
Information Security Consultant at heyData supporting businesses in compliance with DORA and ISO 27001. Engaging with clients and enhancing security offerings in a dynamic startup environment.
Information Security Manager at NVISO, leading cybersecurity initiatives and managing a team of consultants. Focused on enhancing clients’ security posture through strategic program implementation.
Senior Cyber Security Consultant working to enhance software development security for diverse clients. Collaborating with major international firms while leading projects in secure application development.
Information Security Officer at Specialty Systems supporting cybersecurity for Navy systems. Role involves RMF implementation, vulnerability management, and collaboration with technical teams.