Posted in

Information Systems Security Officer

Information Systems Security Officer

CompanyMetroStar
LocationWashington, DC, USA
Salary$Not Provided – $Not Provided
TypeFull-Time
Degrees
Experience LevelSenior, Expert or higher

Requirements

  • Active TS/SCI Clearance with CI poly
  • 7+ years of experience as a cybersecurity analyst with a specialization in Government System ATO support, demonstrating deep knowledge of government ATO principles, methodologies, and tools
  • Strong experience in government regulatory frameworks, compliance requirements, and security standards specific to ATO (e.g., NIST SP 800-53, RMF, ICD 503, FISMA, FedRAMP)
  • Demonstrated and repeat experience achieving and maintaining ATO for cloud services and solutions from IL5 to IL6+ on NIPR, SIPR, and JWICS
  • Understanding of network protocols, operating systems, and infrastructure components
  • Strong proficiency in incident response, security incident handling, and forensic analysis techniques
  • Expertise with government specific ATO assessment tools, vulnerability scanning tools, and intrusion detection/prevention systems
  • Effective communication skills, with the ability to convey complex technical concepts to both technical and non-technical stakeholders
  • CISSP or equivalent certification to support DoD 8140 requirements

Responsibilities

  • Collaborate with government clients to thoroughly understand their system architectures, security requirements, and objectives for achieving and maintaining ATO status within the context of government regulations
  • Conduct exhaustive security assessments and risk analyses that cater to government system compliance, identifying vulnerabilities and potential threats specific to government systems
  • Monitor security systems, logs, and network traffic with a keen focus on government cybersecurity guidelines, identifying any suspicious activity, intrusions, or unauthorized access attempts
  • Collaborate closely with cross-functional teams to establish and maintain government-aligned security measures, including firewalls, intrusion detection systems, data encryption, and access controls
  • Investigate and analyze security incidents to determine their cause, impact, and appropriate response
  • Develop and implement incident response plans, including containment, eradication, and recovery strategies

Preferred Qualifications

    No preferred qualifications provided.