Today
Top Secret
Unspecified
Unspecified
IT - Security
DC (On-Site/Office)
Information Systems Security Officer
Fully Remote (Washington DC Metro Area preferred)
Cyber Security Information Systems Security Officer role maintains responsibility for maintaining the appropriate operational security posture for an information system or program. As part of those duties, the ISSO conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system(s) across multiple program offices to determine the overall effectiveness of the security controls (as defined in the latest revision of NIST SP 800-37). This role analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results. This role is also responsible for maintaining the Continuous Monitoring requirements for all assigned systems.
Core Tasks:
#cjjobs
Marathon TS is committed to the development of a creative, diverse and inclusive work environment. In order to provide equal employment and advancement opportunities to all individuals, employment decisions at Marathon TS will be based on merit, qualifications, and abilities. Marathon TS does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age or any other characteristic protected by law (referred to as "protected status").
Fully Remote (Washington DC Metro Area preferred)
Cyber Security Information Systems Security Officer role maintains responsibility for maintaining the appropriate operational security posture for an information system or program. As part of those duties, the ISSO conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system(s) across multiple program offices to determine the overall effectiveness of the security controls (as defined in the latest revision of NIST SP 800-37). This role analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results. This role is also responsible for maintaining the Continuous Monitoring requirements for all assigned systems.
Core Tasks:
- Develop methods to monitor and measure risk, compliance, and assurance efforts for IT systems across multiple program offices and vendors
- Develop specifications to ensure risk, compliance, and assurance efforts conform with security, resilience, and dependability requirements at the software application, system, and network environment level
- Draft statements of preliminary or residual security risks for system operation. Develop relevant "plan of actions and milestones (POAMs)" for each IT system
- Maintain information systems assurance and accreditation artifacts in accordance with Records Management Requirements
- Monitor and evaluate a system's compliance with information technology (IT) security, resilience, and dependability requirements
- Assess the effectiveness of security controls
- Perform security reviews, identify gaps in security architecture, and develop a security risk management plan
- Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy
- Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change (or vulnerability patch updates)
- Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks
- Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations
- Conduct annual Contingency Plan Tests according to Categorization of system
- Information Assurance
- Information Systems/Network Security
- Information Technology Assessment
- Legal, Government, and related federal security policies
- Risk Management
- Systems Testing and Evaluation
- Vulnerability Assessment
- Security Technical Implementation Guides (STIGs)
- Security Requirements Guide (SRGs)
- Knowledge of current industry methods and federal government standards for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities
- Knowledge of federal government cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
- Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data (data at rest and data in transit)
- Knowledge of the Security Assessment and Authorization process (LATO, ATO)
- Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption)
- Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- Skill in discerning the protection needs (i.e., security controls) of information systems and networks
- Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes
- Ability to oversee security policy standards and implementation strategies to ensure security procedures and guidelines comply with cybersecurity policies
- Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure in federal government (both on-prem and cloud)
- Knowledge of Risk Management Framework (RMF) requirements
- Knowledge of organization's evaluation and validation requirements
- Knowledge of development, and maintenance of System security plan (SSP) document
- Knowledge of cyber defense and vulnerability assessment tools, including open-source tools, and their capabilities
- Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins
- Knowledge of penetration testing principles, tools, and techniques
- Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)
- Ability to lead a team of cyber security support specialists and continuously validate a federal organization's IT systems against policies/guidelines/procedures/regulations/laws to ensure compliance
- Ability to identify security requirements specific to an information technology (IT) system in all phases of the system life cycle
- Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, and inspections
- Assure successful implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization's mission and goals
- Skill in maintaining relationships with third-party vendors who maintain FedRAMP authorizations.
- Knowledge of Cloud Security principles and best practices
- Knowledge of DHA Ports and Protocols (PPS) procedures
- Skill in using eMASS
#cjjobs
Marathon TS is committed to the development of a creative, diverse and inclusive work environment. In order to provide equal employment and advancement opportunities to all individuals, employment decisions at Marathon TS will be based on merit, qualifications, and abilities. Marathon TS does not discriminate against any person because of race, color, creed, religion, sex, national origin, disability, age or any other characteristic protected by law (referred to as "protected status").
group id: 10362312