Applied Research Solutions
Information System Security Officer (ISSO)
Applied Research Solutions, Springfield, Missouri, us, 65897
Information System Security Officer (ISSO)
ARS is looking for an Information System Security Officer (ISSO). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities.
The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact.
Responsibilities
Maintain the operational security posture of systems.
Monitor systems and environments for security compliance.
Develop and update System Security Plans (SSPs).
Manage and control system changes and assess their security impact.
Handle physical, personnel, and environmental security.
Conduct incident response and security awareness training.
Assist the ISSM and assume ISSM duties when necessary.
Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package.
Maintain equivalent IAM Level 2 certifications based on DoD 8140 standard.
Ensure all users have the requisite security clearances, authorization, and need-to-know before granting access to the IS.
Report all security-related incidents to the ISSM.
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Serve as a member of the CCB, if designated by the ISSM.
Coordinate changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval.
Qualifications
Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
Maintain equivalent IAM Level 2 certifications based on DoD 8140 standard.
5+ years related experience in SCI/SAP environments.
Bachelor’s degree in computer science, engineering, finance, business, or related field.
5‑8 years demonstrated performance in related technology.
Top Secret w/ SCI eligibility.
Other duties as assigned.
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
Retention of qualified individuals and the activation of a workforce that provides the expertise of critical repair and support, is a critical element of mission success. Employment of all individuals is in accordance with the requirements of 41 CFR 60‑741.5(a) and 41 CFR 60‑300.5(a), prohibiting discrimination on the basis of disability and protected veteran status.
#J-18808-Ljbffr
The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact.
Responsibilities
Maintain the operational security posture of systems.
Monitor systems and environments for security compliance.
Develop and update System Security Plans (SSPs).
Manage and control system changes and assess their security impact.
Handle physical, personnel, and environmental security.
Conduct incident response and security awareness training.
Assist the ISSM and assume ISSM duties when necessary.
Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package.
Maintain equivalent IAM Level 2 certifications based on DoD 8140 standard.
Ensure all users have the requisite security clearances, authorization, and need-to-know before granting access to the IS.
Report all security-related incidents to the ISSM.
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Serve as a member of the CCB, if designated by the ISSM.
Coordinate changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval.
Qualifications
Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics.
Maintain equivalent IAM Level 2 certifications based on DoD 8140 standard.
5+ years related experience in SCI/SAP environments.
Bachelor’s degree in computer science, engineering, finance, business, or related field.
5‑8 years demonstrated performance in related technology.
Top Secret w/ SCI eligibility.
Other duties as assigned.
All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check.
Retention of qualified individuals and the activation of a workforce that provides the expertise of critical repair and support, is a critical element of mission success. Employment of all individuals is in accordance with the requirements of 41 CFR 60‑741.5(a) and 41 CFR 60‑300.5(a), prohibiting discrimination on the basis of disability and protected veteran status.
#J-18808-Ljbffr