Website Closedloop Communications

All candidates must have (minimally) a Top-Secret clearance with SCI eligibility. 

(Preference:  TS/SCI with a Full Scope Polygraph)

Description:

Provides support for a program, organization, system, or enclave’s information assurance program.

Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.

Maintains occupational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.

Assists with the management of security aspects of the information system and performs day-to-day security operations of the system.

Evaluates security solutions to ensure they meet security requirements for processing classified information.

Performs vulnerability/risk assessment analysis to support certification and accreditation.

Provides configuration management (CM) for information systems security software, hardware, and firmware.

Manages changes to the system and assesses the security impact of those changes.

Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).

Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).

Required capabilities:

Plan and coordinate the IT security programs and policies

Manage and control changes to the system and assessing the security impact of those changes

Obtain C&A for ISS under their purview

Provide support for a program, organization, system, or enclave’s information assurance program

Serve as the Approval Authority for ISs under their control

Qualifications:

10 years’ experience as an ISSO on programs and contracts of similar scope, type, and complexity is required. Experience is to include at least two (2) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.

Education: Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required. DoD 8570 compliance with Information Assurance Management (IAM) Level 1 or higher is required.  Four (4) years of additional experience as an ISSO

CLICK HERE TO APPLY TODAY

© 2020 All Rights Reserved