Information Systems Security Officerother related Employment listings - Beavercreek, OR at Geebo

Information Systems Security Officer

Radiance is looking for a dynamic self-starter to fill the Information Systems Security Officer (ISSO) role on a new program that seeks to create a new paradigm for executing exploitation work in a multi-level security (MLS) environment. This program will require Radiance to challenge current thinking on MLS architectures to develop a solution that will serve as the foundation of future exploitation operations. The ideal candidate will be asked to serve as the ISSO for the project and work closely with the technical leads to ensure that the project deliverables meet all applicable security guidelines. In some cases, the ISSO may be working directly with our government customer to assist in developing new security policies required to support the revolutionary technical solution being developed as part of this contract. Radiance's choice for this position will demonstrate that they can think outside the box and synthesize data from multiple perspectives (current security policy, customer needs, technical solution) to arrive at a workable security approach. In short, we are looking for an ISSO that sees the current operational environment not as a static entity but as an opportunity space that can be molded to Radiance's advantage. Radiance Technologies is an employee-owned company with benefits that are unmatched by most companies in the Dayton, OH area. Employee ownership, generous 401K, full health/dental/life/vision insurance benefits, educational reimbursement, competitive salaries, interesting assignments, and a pleasant work environment combine to make Radiance Technologies a great place to work and succeed. In fact, Radiance has been named by the Dayton Business Journal as the #1 Best Place to Work in Dayton in 2020 and in 2021! The Information Systems Security Officer will perform the following
Responsibilities:
Plans, develops, implements, and maintains programs, policies, and procedures to protect the integrity and confidentiality of stand-alone systems, networks, and data. Provides system security management to ensure stand-alone systems/networks are operated and maintained in accordance with (IAW) regulatory guidelines and in-house implemented policies and procedures. Administers the security training by ensuring users, operators and managers are provided awareness training for their level of responsibility and administers refresher training as necessary. Prepare and/or oversee the development of system/network accreditation documentation. Prepare, distribute, and maintain plans, instructions, guidance, and standing operating procedures concerning the security of system operations Ensure Automated Information System (AIS) activities comply with established security procedures. Develop and review computer system operating instructions for security procedures. Conduct risk assessments as required on systems/networks IAW DoD, NSA, DISA, DIA and other agency regulations and policies governing information systems security. Respond to AIS incidents, perform initial evaluation of each incident, begin corrective measures, and report incidents to ISSM. Responsible for the design, installation, maintenance, and administration of AIS systems and network equipment to support program operations. Performs security and vulnerability testing and implements Information Assurance Vulnerability Alert (IAVA) patches and upgrades to stand-alone in-house networks. Maintains up-to-date knowledge of equipment costs, external assistance costs, software licensing, and personnel costs. Maintains up-to-date knowledge of physical requirements for accreditation and processing within Sensitive Compartmented Information Facilities (SCIFs) and Special Access Program Facilities (SAPFs). Draft and/or prepare and maintain security Assessment and Authorization documentation (e.g., IA SOP, SSP, MSSP, RAR, SCTM) Provide Windows 10, Windows Server, Linux and development tool end user support. Required Skills Experience with various information system security assessment/hardening tools - SCAP Compliance Checker, STIG Viewer, ACAS, Nessus, SECSCN, DISA SRR, Retina, etc. DoD 8570.1M compliant Professional Certification (e.g. Security+, CISSP, GSEC, etc.) Ability to interface with difficult clients and engage in a constructive manner Available to work before/after typical office hours as work may demand Independent self-starter, proactive and professional assertive Effective oral and written communication skills, excellent interpersonal skills, and computer literacy Proficiency with MS Office Suite (MS Word, Excel, PowerPoint and Outlook) Strong analytical and problem-solving skills Superior verbal/written skills and presentation skills Ability to multitask TS/SCI Security Clearance Required Experience 5
years of experience in information systems security/information assurance implementing NISPOM Chapter 8, DoDM 8501.01, JAFAN 6/3, DCID 6/3, ICD 503, and/or JSIG IS requirements SAP experience strongly desired
Qualifications:
Prior experience with DARPA programs and processes Prior experience with US network domains (NIPR, SIPR, JWICS) Experience with Multi Level Security (MLS) system Experience with hardware and software Cross-Domain Solutions (CDS).
Salary Range:
$80K -- $100K
Minimum Qualification
System & Network Administration, IT SecurityEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.