Information Systems Security Officer
Company | MetroStar |
---|---|
Location | Washington, DC, USA |
Salary | $Not Provided – $Not Provided |
Type | Full-Time |
Degrees | |
Experience Level | Senior, Expert or higher |
Requirements
- Active TS/SCI Clearance with CI poly
- 7+ years of experience as a cybersecurity analyst with a specialization in Government System ATO support, demonstrating deep knowledge of government ATO principles, methodologies, and tools
- Strong experience in government regulatory frameworks, compliance requirements, and security standards specific to ATO (e.g., NIST SP 800-53, RMF, ICD 503, FISMA, FedRAMP)
- Demonstrated and repeat experience achieving and maintaining ATO for cloud services and solutions from IL5 to IL6+ on NIPR, SIPR, and JWICS
- Understanding of network protocols, operating systems, and infrastructure components
- Strong proficiency in incident response, security incident handling, and forensic analysis techniques
- Expertise with government specific ATO assessment tools, vulnerability scanning tools, and intrusion detection/prevention systems
- Effective communication skills, with the ability to convey complex technical concepts to both technical and non-technical stakeholders
- CISSP or equivalent certification to support DoD 8140 requirements
Responsibilities
- Collaborate with government clients to thoroughly understand their system architectures, security requirements, and objectives for achieving and maintaining ATO status within the context of government regulations
- Conduct exhaustive security assessments and risk analyses that cater to government system compliance, identifying vulnerabilities and potential threats specific to government systems
- Monitor security systems, logs, and network traffic with a keen focus on government cybersecurity guidelines, identifying any suspicious activity, intrusions, or unauthorized access attempts
- Collaborate closely with cross-functional teams to establish and maintain government-aligned security measures, including firewalls, intrusion detection systems, data encryption, and access controls
- Investigate and analyze security incidents to determine their cause, impact, and appropriate response
- Develop and implement incident response plans, including containment, eradication, and recovery strategies
Preferred Qualifications
-
No preferred qualifications provided.