Huntsville, Alabama, USA
25 days ago
Information System Security Officer (ISSO)

General Summary:

Implementing and documenting management, operational, and technical NIST 800-53 security controls and control enhancements for information technology systems and platforms to ensure a healthy cybersecurity posture and to achieve and maintain Authorization to Operate under the Risk Management Framework in accordance with DOD and organizational policies.

Principal Duties and Responsibilities (*Essential Functions):

Updating and maintaining enterprise Mission Assurance Support System (eMASS) records for information systems and platforms. Creating or updating system Authorization Boundary Diagrams, Information or Data Flow Diagrams, and Security Architectures. Ensuring that assigned IT systems, platforms, or applications can receive an ATO or Assess Only Approval. Reviewing existing documentation and performing edits and updates to ensure the applicable security controls continue to be met and remain effective. Conducting Annual Security Reviews (ASR) and FISMA Reviews for Information System records in eMASS. Reviewing, creating or updating a variety of DOD and RMF documentation (including but not limited to Security Plans (SP), Configuration Management Plans (CMP), Incident Response Plans (IRP), Contingency Plans (CP), Access Control Policies, and other Assessment & Authorization (A&A) artifacts). Preparing, distributing, and maintaining plans, instructions, guidance, and standard operating procedures concerning the security of network or system operations. Identifying the correct applicable Security Technical Implementation Guide (STIG) and Security Requirements Guides (SRG) for technologies used with systems and also testing and applying them to the components of the information system. Identifying and addressing applicable Cyber Tasking Orders, alerts, advisories, errata, and bulletins published from authoritative sources across the organization. Identifying and properly documenting deviations, vulnerabilities, and mitigations on the system Plan of Actions and Milestones (POA&M) in eMASS, to include importing results from technical scans into eMASS and managing the resulting POA&M items. Using a variety of cybersecurity tools that include, but are not limited to, enterprise Mission Assurance Support System (eMASS), Security Content Automation Protocol (SCAP) Compliance Checker (SCC), Assured Compliance Assessment Solution (ACAS)/Nessus Vulnerability Scanner, Evaluate-STIG, eMASSter, DISA STIG Viewer, etc. Performing detailed analyses to validate established security requirements and to recommend additional security requirements and safeguards where appropriate. Supporting the formal testing requirements through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports as needed. Performing evaluations (e.g., internal compliance audits) and/or active evaluations (e.g., vulnerability assessments) of systems to assess Cybersecurity posture and identifying mitigations for risks. Performing routine vulnerability scanning using ACAS/Nessus and STIG configuration compliance scans in accordance with organizational time frames and requirements. Selecting, justifying, and obtaining approval for the correct impact levels for Confidentiality, Integrity, and Availability as well as identifying and implementing applicable control overlays for system records. Supporting meetings with system or information owners, stakeholders, user representatives, engineers, administrators, and leadership to ensure that cybersecurity considerations are addressed across the team and organization.

At COLSA, people are our most valuable resource and centered at our core value. We invite you to unite your talents with opportunity and be a part of our “Family of Professionals!” Learn about our employee-centric culture and benefits here. 

Confirm your E-mail: Send Email