Information Systems Security Officer (ISSO) - Military veterans preferred

2021-06-10
SAIC (www.saic.com)
Other

/yr

  full-time   employee


Chantilly
Virginia
20151
United States

Description

SAIC has an immediate opening for an ISSO to work on an exciting long held contract! The Information Systems Security Officer (ISSO) will be responsible for supporting the implementation of information systems security tasks, as required for the safeguarding, handling, and controlling of classified information. This role requires the applicant to be a self-starter, and also the willingness to initiate communication with various personnel for support and/or compliance requirements.  As the ISSO you will:

⦁    Review A&A packages for Standalone and LAN systems
⦁    Work with external vendors to provide guidance for industrial and system security matters
⦁    Perform annual security assessments
⦁    Consult with and brief executive management on compliance matters
⦁    Prepare and finalize notes for inspection findings and Body of Evidence submissions
⦁    Facilitate Discussions for system deployments and A&A requirements with ISSM and Project Teams
⦁    Review Nessus vulnerability results and assist with POAM creation for project teams
⦁    Support a variety of stand-alone and networked systems

 

Qualifications

Required:

⦁    A minimum of 14+ years of experience is required, and a Bachelor's Degree is strongly desired, but not required
⦁    Must currently hold a TS/SCI & Poly 
⦁    Experience with information systems security best practices and the customer's accreditation process
⦁    Ability to operate independently without supervision
⦁    Working knowledge of NISPOM, NIST 800-53, ICD 503, RMF and DAAPM 
⦁    Experience working on classified processing systems and handling classified material
⦁    Professional and effective interpersonal skills and the ability to provide face-to-face customer support

Desired:

⦁    DoD 8570 IAM Level II or III certifications (CISSP, CISM, CAP, CASP+, etc.)
⦁    Working knowledge of network and communication equipment, protocols, and troubleshooting tool.
⦁    Experience reviewing NESSUS vulnerability scans and reviewing audit logs