Information Systems Security Officer / Administrator

ABOUT THIS POSITION Ensure the systems within the assigned enclaves are operated as authorized by DoD policy and AO Assist the ISSM inthe Security Authorization Process Manage media in facility and ensure sites follow media control plan Maintain and implement system Security Plan (SP) with the ISSM. Enforce security policies and safeguards on all personnel having access to the systems Report security status of the systems to the SYSCON ISSM Conduct securityaudits and log reviews. Assist system and network administrators regarding security issues Ensure compliance and report with IAVMs Assist in applying STIG settings to new systems in coordination with SYSCON System Administrators Use SCAP tool to identify potential vulnerabilities Conduct ACAS scans and coordinate fix actions with the staff. Inform and discuss findings with ISSM Ensure updates to assigned systems are documented and follow the configuration management plan Ensure all users have the proper clearance, authorization to access systems, training and need-to-know Provide training as necessary to staff and users Coordinate activies within the facilities with the ISSM and appropriate security representatives Assist technical staff by providing input into networkarchitecture and providing cybersecurity solutions Perform and monitor completion of the continuous monitor plan Interact with customers to assit in problem resolution Qualifications BASIC QUALIFICATIONS: Bachelors degree in Cybersecurity, Computer / IT management or related discipline.Four (4) years of related work experience may substitute for the degree. Also, each year of education may be substituted for a year of experience. Clearance:US Citizen with an active or current DoD Secret clearance or higher Minimum 2 years experience Minimum DoD 8570 IAT level 2 certification (CCNA Security, CSA , GICSP, GSEC, Security CE, SSCP) Knowledge of multiple desktop, server and network operating systems, especially Microsoft Windows Experience preparing documentation for inclusion into the security authrorization package such as specurity plan, POA&M, operationg procedures and policy Understanding of the ports, protocols and services process Auditing using a log aggregation system Req ID: 1062259
Salary Range: NA
Minimum Qualification
Less than 5 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.