Posted in

Isso

Isso

CompanyKBR
LocationHuntsville, AL, USA
Salary$Not Provided – $Not Provided
TypeFull-Time
DegreesBachelor’s
Experience LevelExpert or higher

Requirements

  • Active Secret Clearance
  • Bachelor’s Degree
  • 10+ years of related work experience required
  • DoDI 8570 IAM Level I certification (Security+ CE, CAP, CND, etc.)
  • DISA Enterprise Mission Assurance Support Service (eMASS) Certification

Responsibilities

  • Serve as an ISSO to the Organizational ISSM in the management and administration of an Authority to Operate (ATO) package
  • Participate in the assessment of confidentiality, integrity, and availability of systems, networks, and data
  • Serve as the front-line team member to the organization’s O-ISSM’s team ensuring adherence to CS policies
  • Assist in the administrative management support of STARE Product Office
  • Develop and maintain relationships between Program/Project Management Offices, STARE program staff, and outside organizations
  • Assist in preparing briefing materials and supporting engineering and development meetings
  • Coordinate regularly with staff performing similar functions within PEO MS STARE Product Office
  • Expectation of travel is approximately 25%

Preferred Qualifications

  • 3+ years of cumulative experience in DoD information technology and Cybersecurity practices
  • 3+ years of cumulative experience in Authorization & Accreditation (A&A) package management
  • 1+ year of independent experience in all six steps of the Risk Management Framework (RMF) lifecycle
  • 1+ years of related experience in Army Cybersecurity processes and procedures
  • 1+ years of experience with Enterprise Mission Assurance Support Service (eMASS) solutions
  • Familiarity with industry Cybersecurity policies and procedures (NIST SP 800-53, 800-37, etc.)
  • Experience working both independently and as a team to accomplish short notice, high priority tasks directed by senior leadership
  • Experience applying problem solving techniques to complex government problems related to adapting enterprise solutions to tactical systems and devices
  • Good understanding of the cybersecurity processes, procedures, regulations, and governance
  • Experience applying and adapting traditional CS requirements to non-standard projects and solutions
  • 1+ years of experience with using security vulnerability and scanning tools (ACAS, STIG Viewer, Evaluate_STIG, SCAP, etc.)