Hanover, Maryland, USA
12 days ago
Information Systems Security Officer (ISSO) Level 2
*

Are you searching for a professional environment that encourages personal and educational development and dedication to the mission? Join a team of security experts who are dedicated to protecting and securing our customers' systems at both the enterprise and program level. Our specialists work closely with others in the RMF process to ensure the highest level of security for every system.


We are seeking an Information Systems Security Officer (ISSO) for a contract that is based out of our Hanover, MD office. As the ISSO, you will serve on a team that is responsible for the Authorization and Assessment process under the Risk Management Framework (RMF) for new and existing information systems and will be expected to maintain Authority to Operate compliance for all assigned systems.

The work environment is fast-paced and sometimes involves deadline pressures. The nature of the work requires a high degree of teamwork and cooperation with other members of the staff as well as individuals across the Company and Customers. Our program includes easily available process information and support from others with similar positions across the team.

Responsibilities\: 

Information Systems Security Officer (ISSO) Level 2 provides support for a program, organization, system, or enclave’s information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to  ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF). *

Are you searching for a professional environment that encourages personal and educational development and dedication to the mission? Join a team of security experts who are dedicated to protecting and securing our customers' systems at both the enterprise and program level. Our specialists work closely with others in the RMF process to ensure the highest level of security for every system.


We are seeking an Information Systems Security Officer (ISSO) for a contract that is based out of our Hanover, MD office. As the ISSO, you will serve on a team that is responsible for the Authorization and Assessment process under the Risk Management Framework (RMF) for new and existing information systems and will be expected to maintain Authority to Operate compliance for all assigned systems.

The work environment is fast-paced and sometimes involves deadline pressures. The nature of the work requires a high degree of teamwork and cooperation with other members of the staff as well as individuals across the Company and Customers. Our program includes easily available process information and support from others with similar positions across the team.

Responsibilities\: 

Information Systems Security Officer (ISSO) Level 2 provides support for a program, organization, system, or enclave’s information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to  ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF). *

Requirements\: 

The Information Systems Security Officer (ISSO) Level 2 shall possess the following capabilities\:

Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies Assist with preparation and maintenance of documentation Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information Assist with the CM for information system security software, hardware, and firmware Maintain records on workstations, servers, routers, firewalls, intelligent hubs , network switches, etc. to include system upgrades Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies Develop and maintain documentation for C&A in accordance with ODNI and DoD policies Provide CM for security-relevant information system software, hardware, and firmware Develop system security policy and ensures compliance Evaluate security solutions to ensure they meet security requirements for processing classified information Maintain operational security posture for an information system or program Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave Develop and update the system security plan and other IA documentation Assist with the management of security aspects of the information system and perform day-to-day security operations of the system Administer the user identification and authentication mechanism of the Information System (IS) Obtain C&A for ISs under their purview Provide support for a program, organization, system, or enclave’s information assurance program Plan and coordinate the IT security programs and policies Manage and control changes to the system and assessing the security impact of those changes Experience working with the XACTA IA Manager Serve as the Approval Authority for ISs under their control

Clearance Required\: 

Active TS/SCI with Poly

Minimum Education\: . 

Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor’s degree (for a total of 14 years’ experience).

Minimum Years of Experience\: 

Ten (10) years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required. Experience is to include at least two (2) of the following areas\: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.

Required Certifications\: 

DoD 8570.1 compliant IAM Level I certification, such as the CompTIA Security certification. A higher-level certification, such as CAP, CASP, CISM and/or CISSP will also be accepted.

Preferred\: 

Knowledge of current security tools, hardware/software security implementation; communication protocols;  encryption tools and techniques Should be highly analytical and effectively able to troubleshoot and prioritize needs, requirements, and other issues. Should be committed to continuous learning and system development because of the constant developing nature of cyber-attacks. Should have the ability to quickly learn new concepts, data formats, and software. Should be a self-motivated, independent, detail oriented, responsible team player, and exhibit exceptional relationship management skills.


#javelin  

Pay Transparency Verbiage
Amentum’s health and welfare benefits are designed to invest in you and in the things you care about. Your health. Your well-being. Your security. Your future. Eligible employees and their dependents may elect medical, dental, vision, and basic life insurance. Employees are able to enroll in our company’s 401k plan, and, if eligible, a deferred compensation plan and Executive Deferral Plan. Employees will also receive 17 days of vacation per year, seven paid holidays, plus floating holidays and caregiver leave. Hired applicants will be able to purchase company stock and have the opportunity to receive a performance discretionary bonus.

The base salary range for this position is $175K to $185K. This range reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.

*

Requirements\: 

The Information Systems Security Officer (ISSO) Level 2 shall possess the following capabilities\:

Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies Assist with preparation and maintenance of documentation Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information Assist with the CM for information system security software, hardware, and firmware Maintain records on workstations, servers, routers, firewalls, intelligent hubs , network switches, etc. to include system upgrades Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies Develop and maintain documentation for C&A in accordance with ODNI and DoD policies Provide CM for security-relevant information system software, hardware, and firmware Develop system security policy and ensures compliance Evaluate security solutions to ensure they meet security requirements for processing classified information Maintain operational security posture for an information system or program Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave Develop and update the system security plan and other IA documentation Assist with the management of security aspects of the information system and perform day-to-day security operations of the system Administer the user identification and authentication mechanism of the Information System (IS) Obtain C&A for ISs under their purview Provide support for a program, organization, system, or enclave’s information assurance program Plan and coordinate the IT security programs and policies Manage and control changes to the system and assessing the security impact of those changes Experience working with the XACTA IA Manager Serve as the Approval Authority for ISs under their control

Clearance Required\: 

Active TS/SCI with Poly

Minimum Education\: . 

Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor’s degree (for a total of 14 years’ experience).

Minimum Years of Experience\: 

Ten (10) years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required. Experience is to include at least two (2) of the following areas\: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.

Required Certifications\: 

DoD 8570.1 compliant IAM Level I certification, such as the CompTIA Security certification. A higher-level certification, such as CAP, CASP, CISM and/or CISSP will also be accepted.

Preferred\: 

Knowledge of current security tools, hardware/software security implementation; communication protocols;  encryption tools and techniques Should be highly analytical and effectively able to troubleshoot and prioritize needs, requirements, and other issues. Should be committed to continuous learning and system development because of the constant developing nature of cyber-attacks. Should have the ability to quickly learn new concepts, data formats, and software. Should be a self-motivated, independent, detail oriented, responsible team player, and exhibit exceptional relationship management skills.


#javelin  

Pay Transparency Verbiage
Amentum’s health and welfare benefits are designed to invest in you and in the things you care about. Your health. Your well-being. Your security. Your future. Eligible employees and their dependents may elect medical, dental, vision, and basic life insurance. Employees are able to enroll in our company’s 401k plan, and, if eligible, a deferred compensation plan and Executive Deferral Plan. Employees will also receive 17 days of vacation per year, seven paid holidays, plus floating holidays and caregiver leave. Hired applicants will be able to purchase company stock and have the opportunity to receive a performance discretionary bonus.

The base salary range for this position is $175K to $185K. This range reflects the minimum and maximum target for new hire salaries for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.

*Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran’s status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans  and Labor Laws Posters.
Confirm your E-mail: Send Email