Provide support for a program, organization, system, or enclave's information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perf... more details
Jacobs is seeking an Information Systems Security Officer (ISSO) 3 for a prime contract that is based out of our Columbia, MD office.
Responsibilities:
Provide support for a program, organization, system, or enclave's information assurance program.
Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
Assist with the management of security aspects of the information system and perform day-to-day security operations of the system.
Evaluate security solutions to ensure they meet security requirements for processing classified information.
Perform vulnerability/risk assessment analysis to support security authorization.
Provide configuration management (CM) for information systems security software, hardware, and firmware.
Manage changes to system and assess the security impact of those changes.
Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
Support security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).
Here’s What You’ll Need:
Ten (10) years of combined work-related experience in the fields of IT, cybersecurity or security authorization is required.
Bachelor's degree in Computer Science, Cyber Security or IT Engineering is required.
In lieu of a Bachelor's degree, four (4) additional years of work-related experience may be substituted for a total of fourteen (14) years.
Compliance with DoD 8570.01-M with a minimum certification of IAM Level I is required.
Experience in at least two of the following areas is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques.
Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
Must be able to:
Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies.
Assist with preparation and maintenance of documentation.
Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information.
Assist with Configuration Management (CM) for information system security software, hardware, and firmware.
Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades.
Propose, coordinate, and implement information systems security policies, standards, and methodologies.
Develop and maintain documentation for Security Authorization in accordance with ODNI and DoD policies.
Provide CM for security-relevant information system software, hardware, and firmware.
Ensure compliance with system security policy.
Evaluate security solutions to ensure they meet security requirements for processing classified information.
Maintain operational security posture for an information system or program.
Provide support to the information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave.
Develop and update the system security plan and other Cybersecurity documentation.
Assist with the management of security aspects of the information system and perform day-to day security operations of the system.
Track and ensure appropriate user identification and authentication mechanism of the information System (IS)
Obtain system authorization for ISs under their purview.
Provide support for a program, organization, system, or enclave's information assurance program.
Plan and coordinate implementation of IT security programs and policies.
Manage and control changes to the system assessing the security impact of those changes.
Provide daily oversight and direction to contractor ISSOs.
Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status. 20362-VDM4 (TR-VDM4) 6716 Alexander Bell Dr. Ste. 210 Columbia, 21046
Job Abstracts is an independent Job Search Engine. Job Abstracts is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Job Abstracts uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder. Job Abstracts does not have its members apply for a job on the jobabstracts.com website. Additionally, Job Abstracts may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.
We would like to take a second to Welcome You to Job Abstracts, the nation’s largest Pure Job Board. With over 3.1 million job listings from 15,000+ Companies & Organizations, we help job searchers find careers that match their interests. As an anonymous user, you have probably discovered how easy our system is to use. However, you have just scratched the surface of what we can offer.
We encourage you to Register so you can use our most powerful features: searching with multiple terms, setting up multiple locations, establishing favorite companies, and accessing your search history. If you find a job you like, you can apply directly for it, and then, keep notes on it. We will also keep a lookout for jobs that match your search terms and email you when we find something you may like.
You can register for free and the system is free to use. If you like our system so far, click on Register and unlock the power required by serious job searchers.
Any time you conduct a search, the system shows you job matches, ranked by their Relevance Score (RS).
The score is calculated by a proprietary algorithm that uses Intelligent Machine Learning.
The Relevance Score tells you how well the job opportunity matches your search term or terms.
When not logged in, the system is limited to one search term. Scores for single term matches are usually lower.
When you register, log in, and set up multiple terms prioritized by importance, the jobs found for you will receive a much higher Relevance Score.