[ Back ] [ The Roadtechs Nuclear Job Board ] [ Help ] [Edit ] [Mark Position Closed ]
The Information Systems Security Officer (ISSO) will be responsible for ensuring development and proper implementation of the security controls documented in the Systems Security Plan (SSP) for all information systems for which the ISSO is responsible at client, including sensitive unclassified networks supporting business, special purpose, and security functions. The ISSO provides certification documentation to the client Information Systems Security Manager (ISSM) for all information system accreditations and performs other duties as required to implement the Cyber Security programs necessary to support U.S. Government regulatory requirements, (DOE/NNSA, NRC, etc.). In addition to the duties required to maintain SSPs, the ISSO is also responsible for security operations duties, including proactively monitoring event sources for anomalies, conducting vulnerability assessments, incident response activities, firewall administration, and being an all-star problem solver. The candidate will be responsible for the following scope of work duties:
Essential Duties/Responsibilities (may include, but are not limited to):
Ensures implementation of protection measures documented in the SSP for each information system for which they are the ISSO. Maintain the SSP and associated artifacts, including risk assessments, Privacy Impact Assessments, vulnerability assessments, Plans of Action and Milestones (POA&Ms), etc.
Ensures that security controls for information system resources are based on the least privilege principle and develops alternative solutions to mitigate risk when the most desirable security controls cannot be fully implemented.
Identifies, in coordination with the ISSM, and documents in the SSP, unique threats to information systems for which they are responsible.
Provides technical assistance with the initial set-up, secure deployment, and proper management of systems that support information security including virus detection, application whitelisting, centralized logging, data loss prevention, and intrusion detection systems.
Performs risk assessments and tests of new technology platforms and leads the implementation of standard security configurations, (ex: DISA STIG, CIS Benchmarks, etc.), prior to production deployment.
Utilizes vulnerability assessment software and related tools to immediately highlight errors in systems configuration, the need for the update of software with fixes and patches, and other security related changes.
Ensures the implementation of procedures as defined in the Cyber Security Program Plan (CSPP) and the SSP for each information system for which they are the ISSO.
Serves as an active member of the Cyber Security Incident Response Team (CSIRT) and participates in security incident response efforts by directing first responders to triage an event and performing advanced response actions for escalated events.
Ensures that information access controls and cyber protection measures are implemented for each information system as described by the SSP.
Ensures that users and System Administrators are properly trained in information system security by identifying cyber security training needs and the personnel who need to attend the cyber security training program. Supports awareness training of the workforce on information security standards, policies, and best practices.
Conducts cyber security reviews and tests to ensure that cyber security features and controls are functioning and effective.
Performs administration of the centralized logging platform, develops custom dashboards to monitor security status of the environment, and produces periodic reports of key performance indicators and key risk indicators to support Cyber Security metrics at the executive and operational levels
Redesigns and reengineers internal information handling processes so that information is appropriately protected from a wide variety of problems including unauthorized disclosure, unauthorized use, inappropriate modification, premature deletion, and unavailability
Develops technical documentation describing the deployment, configuration, and management of shared, networked, and multi-user information security systems
Regularly attends conferences, professional association meetings, and technical symposia to remain aware of the latest information security technological developments
Minimum Qualifications (Knowledge, Skills, Abilities):
Candidate must have prior experience performing risk assessments, developing security plans, implementing DISA STIGs, and developing Standard Security Configuration Guides or similar technical products
Must have an understanding of open-source and other tools to assist in detection, prevention and analysis of security threats.
Must have a working knowledge of system functions, firewall administration, cyber security policies, and cyber security protection requirements
Must have experience in at least 2 of the following technology vendors: Cisco FirePower, CarbonBlack, Cylance, DataLocker, Entrust, FireEye/Trellix, PDQ Deploy, Varonis DLP, Tennable, Forescout, VMWare VSphere, Cisco Umbrella, Amazon AWS, KnowBe4, RSA Archer, Splunk.
Must have excellent communications skills, especially technical report writing; candidates are encouraged to submit a sample of a technical report authored by the candidate
Must have one or more of the following certifications: GSEC, CEH, CISSP, CCSP, CISA, GCIH, OSCP
Must be able to maintain confidentiality when working with sensitive information.
All qualified applicants will be considered; however, the successful candidate must be able to obtain and maintain a Q clearance from the United States Department of Energy.
Education and Experience Required:
Level 2: Bachelors' degree in Information Systems, Computer Science, Management Information Systems, or a related discipline combined with at least two(2) years of experience to include technical skills and experience. A combination of education and relevant experience wherein the knowledge, skills and abilities to perform the positionís duties and responsibilities have been adequately demonstrated is acceptable.
Level 3: Bachelors' degree in Information Systems, Computer Science, Management Information Systems, or a related discipline combined with at least five (5) years of experience to include technical skills and experience. A combination of education and relevant experience wherein the knowledge, skills and abilities to perform the positionís duties and responsibilities have been adequately demonstrated is acceptable.
Level 4: Bachelors' degree in Information Systems, Computer Science, Management Information Systems, or a related discipline combined with at least nine (9) years of experience to include technical skills and experience. A combination of education and relevant experience wherein the knowledge, skills and abilities to perform the positionís duties and responsibilities have been adequately demonstrated is acceptable.
Experience required for all levels: Splunk administration, network intrusion detection system (IDS) administration, Active Directory and Group Policy Objects, Anti-virus administration consoles, Data Loss Prevention (DLP) systems, Microsoft Windows operating systems, Linux operating systems and advanced cyber security toolkits, malware analysis, penetration testing, and digital forensics tools.
Education Equivalency: 2 years of relevant experience for 1 year of college.