Full Job Description
This position is for an Information Systems Security Officer (ISSO) at Integrated Defense Systems, Woburn, MA. The ISSO provides support to classified computing environments. This person will be responsible for assisting in the development and enforcement of information systems security procedures in accordance with company and government regulations and policies. The ISSO will be responsible for system compliance, auditing, security plan development and delivering information systems security education and awareness. The ISSO will assist in investigating information system security violations and helps prepare reports specifying corrective and preventative actions. The position routinely interfaces with their facility security team, program personnel and government representatives.
This req can be filled as G07 or G08, depending on the direct qualifications of the selected candidate.
This position requires an existing DoD SECRET Clearance.
This position is ERIP eligible.
Capped relocation support is available to the selected applicant if eligible per Company policy. Amount of budget to be discussed at the appropriate time.
G07 (2+) years relevant experience /G08 (4+)years of experience working with and/or supporting computer technologies (such as: Microsoft Office applications, databases, operating systems or computer network hardware)
Currently holds a US DoD SECRET Clearance
Ability to obtain and maintain Information Security professional certification commensurate with DoD 8570.1-M Level 2 requirements (Security+ or other) within six months of hire date.
Existing DoD SECRET/TOP SECRET/TOP SECRET/SCI Clearance
Working experience with operating systems; Solaris, HPUX, Linux, or Windows
Experience working with government regulations, such as NISPOM, JAFAN, JSIG, DIACAP and Risk Management Framework. Regulation is based on customer requirements
Experience supporting various system configurations (Stand Alone, Local Area Networks, Wide Area Networks)
Preparation of Assessment and Authorization documents and procedures
Ability to deliver Cybersecurity related briefings and training material
Self-motivated and possess good written, verbal, listening and presentation skills, particularly in documenting evaluation results
Previous experience working in a classified information systems environment
Desire and ability to work as a team member
Knowledge of Six Sigma and statistical techniques
Customer focused, adaptable and willing to work varying assignments
Familiarity with Test Equipment and Sanitization Procedures
Organizational skills to include: attention to detail, time management and ability to multitask
Must be flexible and work with general supervision
Experience with audit reviews such as: physical security, network and application, password administration, file access privileges, etc.
Security+ or similar 8570 certification
Bachelor's Degree in either Computer Science, Information Systems Management, Information Technology, Criminal Justice, Business or other relevant degree OR 8 years related experience in lieu of degree
The following courses can be completed at the DSS Training Website: https://cdse.usalearning.gov/login/index.php
NISPOM Chapter 8 Requirements for Industry (IS201.16)
Introduction to Industrial Security (IS011.16 / .06)
Safeguarding Classified Information (IS109.16 / .06)
OPSEC Security Awareness(GS130.16)
Cyber Security Awareness(CI130.16)
Introduction to the Risk Management Framework (RMF) (CS124.16)
Risk Management Framework (RMF) Curricula (CS100.CU)
Continuous Monitoring (CS200.16)
Special Access Program Overview (SA001.16/06)
All these job responsibilities are to be executed in harmony with Integrated Defense System's Code of Business Ethics and Conduct policy which sets the standard by which we operate and how we treat others.
NISPOM DD254 Security Windows UNIX LINUX Information Systems Security Information Assurance Certification and Accreditation Cyber Software Engineer Computer Science MIS Management Information Systems ISSO CISSP CISM JAFAN JSIG DCID ISSM Information Security Information Technology IT Auditing Cyber DSS C&A IA IAM IAO Information Systems Security Officer Information Systems Security Manager Microsoft Windows Office UNIX Linux HPUX Solaris, Cybersecurity