Information Systems Security Officer III
Bernalillo County, NM
Business Group Highlights
The Intelligence group provides high-end systems engineering and integration products and services, data analytics and software development to national and military intelligence customers. Serving federal agencies and the Intelligence Community for more than 50 years, the Intelligence group helps our clients meet their mission needs by providing trusted advisors, leading-edge technologies, and innovative solutions.
An Information System Security Officer (ISSO) includes skill requirements from a security office for all information technology issues such as malicious code eradication, configuration management, assessment and authorization of current and future systems. ISSOs shall know how to implement common information system security practices, policies, and technologies. Additionally, ISSOs demonstrate self-motivation, initiative, sound judgement, effective interpersonal skills, team building skills, and effective communication skills.
The Level-3 ISSO position is a senior level or subject matter expert (SME) information system security professional who provides advice and assistance to the Government regarding secure configuration and operation of IT assets. Level-III ISSOs apply extensive knowledge and experience of a variety of information system security concepts, practices, and procedures. ISSO Level-3 contractors should be able to perform the following responsibilities:
- Conduct research and analysis.
- Understand network and information system security principles and best practices.
- Control, label, scan for viruses, and appropriately transfer data (uploading/downloading) between information systems at varying classification levels.
- Understand and apply network security principles, practices, and implementations.
- Maintain a working knowledge of cross-functional integration of information systems into a physical security environment.
- Possess a working knowledge of system functions, security policies, technical security safeguards, and operational security measures.
- Understand system methodologies including but not limited to client servers, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, LAN, switches, and routers.
- Possess expertise in detecting and preventing computer security compromises in a networked environment.
- Understand configuration management, system maintenance, and integration testing.
- Possess expertise in the use of tools to prevent and/or negate malicious code.
- Understand COTS tools that scan at the physical layer of all removable and fixed media types, including but not limited to: CDs, hard drives, thumb drives, Zip/Jazz, etc.
- Decipher and explain in clear language Intelligence Community Directive (ICD) 503.
- Possess expertise in forensics and evidentiary preservation.
- Troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data.
- Translate technical information and information technology jargon into plain English.
- Apply a risk management philosophy when faced with security challenges and articulate the pros and cons in a clear concise manner.
- Demonstrate proficiency with various computer operating systems, including but not limited to: Microsoft Windows, LINUX, UNIX, Mac OS, etc.
- Decipher complex technical configuration management documents.
- Demonstrate proficiency with database maintenance.
- Elicit, articulate, and document information in a well-organized manner.
- Be able to work independent of close supervision.
- Possess experience with Microsoft Office Suite.
- Understand applicable IC and DoD policies, procedures and operating instructions related to Information Technology, Information Assurance, and Information Management (IT/IA/IM).
- Utilize excellent communication, interpersonal, and team-building skills to engender rapport with the military personnel, civilians, and other contractors at all levels.
- Prioritize work to meet deadlines and to manage the workflow of the ISSO team.
- Correlate audit results between various systems and/or users and notify the ISSM of any discrepancies.
- Demonstrate proficiency in successfully guiding complex information systems through assessment and authorization control gates.
- Establish and maintain effective internal and external working relationships with government and contractor program managers, security professionals, and mission partners.
- Effectively provide ISSO guidance to Level-1 and Level-2 ISSOs.
The following qualifications are desired:
a. Bachelors Degree with 7 years of experience
b. Active TS/SCI with Poly
c. Education relevant to computer engineering, information security, information management, and/or computer science
d. Experience in technical project management
e. Any of the following certifications: CISA, GCIH, GCED, CISSP, CASP, CAP, GSLC, CISM
What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sectorfrom investigative services and IT strategy to systems work and next-generation engineering.
Our promise is simple: never stop solving our nations most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to just that, as a partner of choice across the entire sector.
Perspecta is an AA/EEO Employer - Minorities/Women/Veterans/Disabled and other protected categories.
Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed
As a government contractor, Perspecta abides by the following provision
PAY TRANSPARENCY NONDISCRIMINATION PROVISION
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)