Information Systems Security Engineer
Information Systems Security Engineer, Level 2
The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security testing.
Security Clearance Requirements: This position requires all candidates to be U.S. Citizens and possess an active TS/SCI Security Clearance with a Polygraph.
Responsibilities:
- Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of secure networking, computing, and enclave environments.
- Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of IA architectures, systems, or system components.
- Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments.
- Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments.
- Interact with the customer and other project team members.
- Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components.
- Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures.
- Support security planning, assessment, risk analysis, and risk management.
- Identify overall security requirements for the proper handling of Government data.
- Provide security planning, assessment, risk analysis, and risk management.
- Perform system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements.
- Recommend system-level solutions to resolve security requirements.
- Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architecture.
Qualifications:
Required Education & Years of Experience:
- Fourteen (14) years experience as an ISSE on programs and contracts of similar scope, type, and complexity is required.
- Bachelor’s degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required.
- Four (4) years of ISSE experience may be substituted for a bachelor’s degree.
- DoD 8570.01-M compliance with IASAE Level 2 is required CISSP Certification is required
Information Systems Security Officer, Level 3
Provides support for a program, organization, system, or enclave’s information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).
Security Clearance Requirements: This position requires all candidates to be U.S. Citizens and possess an active TS/SCI Security Clearance with a Polygraph.
Responsibilities:
- Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies.
- Assist with preparation and maintenance of documentation.
- Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information.
- Assist with the CM for information system security software, hardware, and firmware.
- Maintain records on workstations, servers, routers, firewalls, intelligent hubs , network switches, etc. to include system upgrades.
- Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies.
- Develop and maintain documentation for C&A in accordance with ODNI and DoD policies.
- Provide CM for security-relevant information system software, hardware, and firmware.
- Develop system security policy and ensures compliance.
- Evaluate security solutions to ensure they meet security requirements for processing classified information.
- Maintain operational security posture for an information system or program.
- Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave.
- Develop and update the system security plan and other IA documentation.
- Assist with the management of security aspects of the information system and perform day-to-day security operations of the system.
- Administer the user identification and authentication mechanism of the Information System (IS).
- Obtain C&A for ISs under their purview.
- Provide support for a program, organization, system, or enclave’s information assurance program.
- Plan and coordinate the IT security programs and policies.
- Manage and control changes to the system and assessing the security impact of those changes.
- Manage and control changes to the system and assessing the security impact of those changes.
- Serve as the Approval Authority for ISs under their control.
- Provide daily oversight and direction to contractor ISSOs.
- Serve as an ISSM.
- Interact with customers, IT staff, and high-level corporate officers to define and achieve required IA objectives.
Qualifications:
Required Education & Years of Experience:
- Fifteen (15) years experience as an ISSO on programs and contracts of similar scope, type, and complexity is required.
- Experience is to include at least three (3) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools.
- Bachelor’s degree in Computer Science or related discipline from an accredited college or university is required.
- Four (4) years of additional experience as an ISSO may be substituted for a bachelor’s degree.
- DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required.