Information Systems Security Officer - TS/SCI with Polygraph Required!
MARYLAND-HANOVER
Fulltime
Description
ISSO / Analyst required to perform security monitoring and analysis of system, network and security logs as part of the continuous monitoring and incident response requirements, and conducting investigations and analysis of information system security events and incidents for the Client’s systems and services.
Perform security monitoring and analysis of system, network and security logs as part of the continuous monitoring and incident response requirements for the Client’s systems and services to report on possible risks to or violations of security. Research activity detected to determine its source and nature and probable cause, and assess to determine actual or potential risk. Coordinate and conduct investigations of security events and incidents, document and report on investigations of possible security risks or violations. Interface with Agency and external investigative organizations to resolve potential and real information security events and incidents
Essential Job Functions
• Identifies security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives. Develops, tests and operates firewalls, intrusion detection systems, enterprise anti-virus systems and software deployment tools.
• Provides complex engineering analysis and support for firewalls, routers, networks and operating systems. Performs and evaluates vulnerability scans within a multi-platform, large enterprise environment. Reacts to and initiates corrective action regarding security violations, attempts to gain unauthorized access, virus infections that may affect the network or other event affecting security.
• Oversees user access process to ensure operational integrity of the system. Enforces the information security configuration and maintains system for issuing, protecting, changing and revoking passwords.
• Develops technical and programmatic assessments, evaluates engineering and integration initiatives and provides technical support to assess security policies, standards and guidelines. Develops, implements, enforces and communicates security policies and/or plans for data, software applications, hardware and telecommunications.
• Performs complex product evaluations, recommends and implements products/services for network security. Validates and tests complex security architecture and design solutions to produce detailed engineering specifications with recommended vendor technologies.
• Reviews, recommends and oversees the installation, modification or replacement of hardware or software components and any configuration change(s) that affects security.
• Provides complex technical oversight and enforcement of security directives, orders, standards, plans and procedures at server sites. Ensures system support personnel receive/maintain security awareness and training.
• Assesses the impact on the business unit/customer caused by theft, destruction, alteration or denial of access to information and reports to senior management.
• Provides leadership and work guidance to less experienced personnel.
Qualifications
Contract Qualifications you must meet for this position:
• Active CISSP or CASP to meet DoD 8570 IASAE I role certification requirement
• Active TS/ SCI with Full scope polygraph required
• Active Certified Ethical Hacker (CEH) to meet DoD 8570 CNDSP Infrastructure Support role and CNDSP Analyst role certification requirement.
• Minimum of 6 years experience in a Security Engineering role
• Minimum of 3 years within the IC or DoD
• Experience with security analysis tools. Security systems administration is a plus.
• Experience with NMAP and Nessus.
• Familiarity with the directives and requirements outlined in the ICD 503, NIST, and CNSS policies and guidance that govern the deployment and monitoring of secure information systems and networks.
• Experience with configuring and maintaining secure configurations for Linux and Microsoft operating systems.
• Substantive knowledge and understanding of working with and securing: network topologies, VPNs, encryption, CentOS, web technologies, Java-based web applications, virtualization technologies such as OpenStack, PKI-based authentication, and integration with authorization systems
• Experience reviewing and analyzing operational and security documentation and configurations to assess and validate operational security controls are maintained. The candidate should be process oriented and have good verbal and writing communication skills and good interpersonal skills
• Must be able to work equally as well in a team environment and individually
• Must have good customer relations skills and be flexible in a fast paced changing environment
Thanks & Regards,
Anna Y
Desk: (630) 281 4516 | FAX: (630) 778 5331
FMBE Certified Company
www.frontiertechllc.com
Basic Qualifications
• Bachelor's degree or equivalent combination of education and experience
• Bachelor's degree in computer science or related field preferred
• Seven or more years of experience in network, host, data and/or application security in multiple operating system environments
• Experience working with IP networking, networking protocols and understanding of security related technologies including encryption, IPsec, PKI, VPNs, firewalls, proxy services, DNS, electronic mail and access-lists
• Experience working with internet, web, application and network security techniques
• Experience working with relevant operating system security (Windows, Solaris, Linux, etc.)
• Experience working with leading firewall, network scanning and intrusion detection products and authentication technologies
• Experience working with federal regulations related to information security (FISMA, Computer security Act, etc.)
• Experience working with NIST Special Publications and C & A process methodology
• Possess security certifications (CISSP, CCNA, etc) and/or top secret security clearance
Other Qualifications
• Good communication skills
• Strong analytical and problem solving skills to troubleshoot and resolve network/operating system security issues
• Ability to perform and interpret vulnerability assessments
• Ability to administer the operations of a security infrastructure
• Ability to balance and prioritize work
Other Desired Qualifications
• Experience with configuring and maintaining secure configurations for Linux or Microsoft operating systems
• Experience in government or commercial cloud systems and elastic compute
• Understanding of Risk Management Framework according to ICD 503, CNNSI 1253 and NIST SP 800
• Knowledge and understanding of working with and securing routers, switches, firewalls, VPNs, VLANs, IDS, Windows systems