Information System Security Officer Information Technology (IT) - Truckee, CA at Geebo

Information System Security Officer

Quick Apply Full-time 9 hours ago Full Job Description Our client is a world-renowned, single-source provider of production and automated assembly systems for the aerospace and defense industry.
They produce a full suite of both mold and assembly tooling required for the aerospace manufacturing market, including the largest Invar molds ever made-- making them the largest tooling group in the industry.
They are seeking self-motivated, safe, positive, enthusiastic, and goal-oriented individuals for an immediate opening as Information System Security Officer (ISSO).
What Is In It For You Salary:
$100k-140K, depending on relevant industry experience.
Benefits:
Paid (individual) health insurance, life, and disability insurance, and paid vacation and sick time.
Relocation:
Open to paying relocation costs.
A Day In The Life of a Information System Security Officer (ISSO) As an Information Systems Security Officer (ISSO), is responsible for contributing to security of the information systems at our secure facility and certifies to DCSA that all security requirements are in place and the system is properly configured and protected.
This person participates in technical research and development to enable continuing innovation within the cyber infrastructure.
This person also ensures that system hardware, operating systems, software systems, and related procedures adhere to organizational values.
Essential Job Functions For The Information System Security Officer (ISSO) In Irvine, CA:
This document in no way states or implies that these are the only duties to be performed by the employee occupying the position.
Perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy.
Coordinate with the ISSM in preparation, update, and maintenance of Risk Management Framework (RMF) documentation such as, but not limited to, Authorization to Operate (ATO) packages, System Security Plans (SSP), Security Control Traceability Matrixes (SCTM) and Plan of Actions and Milestones (POA&Ms).
Perform periodic self-inspections and continuous monitoring of the IS to ensure systems and security controls are operating to maintain ATO status.
Identify and mitigate potential security weaknesses and ensure that all security features applied to a system are implemented and functional.
Oversees day-to-day security posture and continuous monitoring of IS including security event log review and analysis.
Schedule, perform and maintain records of required IS auditing, patching, maintenance, configuration management changes, and scanning based on evolving threat/vulnerabilities and customer compliance requirements.
Serve as a Data Transfer Agent (DTA) and work with Media Custodians to perform file transfers in accordance with the Assured File Transfer (AFT) policy and procedures.
Coordinate with Facility Security Officer (FSO) and Contractor Program Security Officer (CPSO) and ISSM to define, implement and maintain information security policies, strategies, and procedures.
Conduct IS Security briefings as required and perform account management procedures for new users.
Contribute to the compliance and policy aspects for the company regarding Information Assurance for systems and networks that contact government information.
Ensure system security measures comply with applicable government policies.
Provide configuration management and accurately assess the impact of modifications and vulnerabilities for each system.
Proactively anticipates and meets customer needs.
Must be a self-starter with a high sense of accountability.
Collaborates throughout the organization, seen as a trusted business partner in accomplishing work.
Work independently and professionally to ensure the IT team is meeting business expectations.
Required Skills, Education & Experience Any combination of education and experience providing the required skill and knowledge for successful job performance will be considered.
Typical qualifications would be:
Must have held a DoD security clearance in the past 2 years and be able to attain and maintain an active Secret clearance Must be familiarity with classified computing environments in one or more of the following; ICD-705, DoDIs 8500.
01 & 8510.
01, NIST SP 800-53, and Risk Management Framework (RMF), and determine which controls are applicable to the application, as well as document implementation in Security Controls Tractability Matrix (SCTM).
Must have a DoD 8570.
01 Certification of IAT Level II Security
CE or equivalent or attain certification within 6 months of hire Must have excellent writing skills (email communication, procedure writing, etc.
) Preferred Qualifications Bachelor's degree preferred.
Technical certification is preferred.
Microsoft, Cisco, CompTIA A+, Net
Be able to secure systems using RMF framework and Security Technical Implementation Guides (STIGs) standards Familiar with Defense Counterintelligence and Security Agency (DCSA), Risk Management Framework (RMF), Security Technical Implementation Guides (STIGs), and Security Content Automation Protocol (SCAP) Tool This position must meet Export Control compliance requirements, therefore a US Person as defined by 22.
C.
F.
R.
is required 3-5 years' experience using desktop imaging tools.
(Windows Deployment Services, Acronis) 3-5 years' experience supporting enterprise Anti-Virus/Anti-Malware tools.
(Agent Based tools, etc.
) Experience supporting CNC machine controls is a plus.
Experience supporting VeriSurf Laser tracking software is a plus.
If you are interested in the Information System Security Officer job in Irvine, CA apply today! This vacancy is being advertised by Total Aviation Staffing, LLC.
The services advertised by Total Aviation Staffing, LLC are those of an Employment Agency Quick Apply.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.