ISSO

Sorry, this job was removed at 06:36 p.m. (CST) on Tuesday, May 06, 2025
Be an Early Applicant
MacDill Estates, FL
In-Office
Information Technology • Consulting
The Role

Who We Are…
Today’s leading government agencies are putting their trust in Newberry Group, and for good reason. 
Newberry brings strength to our clients, from the inside out through:
•    client intimacy and superior quality,
•    presence and accountability in our relationships, and
•    public sector best practices.
Newberry Group is a professional services firm, providing information security compliance, governance, program/project management, and mission critical project-based consulting to public sector clients nationwide. 
The strength of our company is a direct reflection of our highly skilled and talented workforce.
Job Summary
Newberry Group seeks an Information Systems Security Officer (ISSO) for a potential contract to begin later this year. The position provides comprehensive IT systems security control assessments.

Location 
MacDill AFB, FL – this is a hybrid position requiring a minimum of 3 days onsite weekly.
Clearance & Certification
DoD Secret Clearance required and a current IAT Level II or CISSP certification
Contingencies
Contingent on Contract Award
Primary Responsibilities:

  • Adhere to DAF and DoD laws, standards, policies and procedures.
  • Conduct comprehensive IT security control assessments. Assessments shall determine the condition of the management, operational, and technical security controls employed within or inherited by an information system to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system).
  • Provide an assessment on the severity of weaknesses or deficiencies discovered in the information system and its environment of operation and recommend corrective actions and or controls to address identified vulnerabilities.
  • Review the System Security Plan (SSP), prior to initiating the security control assessment and ensure the plan provides a set of security controls for the information system that meet the stated security requirements. Assessments shall include the review and validation of the authorized message types and the parsing of the data utilizing rule sets implemented within the Cross Domain Solutions (CDS) application to validate authorized processing of data and elimination of the possible spillage of classified information.
  • Advise the ISSM concerning impact values for confidentiality, integrity, and availability for the information on a system.
  • Evaluate threats and vulnerabilities to information systems to ascertain the need for additional safeguards and controls to mitigate vulnerabilities.
  • Review and approve the information system security assessment plan, which is comprised of the SSP, the Security Controls Traceability Matrix (SCTM), and the Security Control Assessment Procedures.
  • Ensure security control assessments are completed for each information system and ensure controls are working as intended and these controls protect the confidentiality, integrity and availability of IT resources at the appropriate levels.
  • Prepare the final Security Assessment Report (SAR) containing the results and findings from the assessment at the conclusion of each security control assessment activity.
  • For each completed site visit provide a visit report.
  • Support compliance with RMF controls to include, as necessary, development of Plans of Action and Milestones (POA&Ms) and mitigation of control deficiencies.
  • Evaluate security control assessment documentation and provide written recommendations for security authorization to the AO.
  • Assemble and submit the security authorization artifacts to the AO (consisting of, at a minimum, the SSP, the SAR, the POA&M, and a Risk Assessment Report (RAR).
  • Assess the proposed changes to information systems, their environment of operation, and mission needs to determine if they are security-relevant and could therefore affect system authorization.
  • Use Security controls defined by the AO and lead ISSM.
  • Utilize the RMF methodology to successfully implement an information technology process which shall effectively protect the element's information assets and its ability to perform its mission to include but not limited to Configuration Management.
  • Provide guidance to other assessors on the policies and procedures of the job.
  • Provide detailed assessment findings using Government-specified processes and procedures.
  • Provide solutions and recommendations to remedy security vulnerabilities, threats, to ultimately improve the protection of IT resources and to execute the customer mission.
  • Utilize assessment results to identify trends and to improve IA training, policies and processes.
  • Utilize RMF tools such as (but not all encompassing) Enterprise Mission Assurance Support Service (eMASS), SNAP, Information Technology Investment Portfolio System (ITIPS), and Grid Interconnection Approval Process (GIAP) system for establishment of connection to the NIPR and SIPR enclaves.
  • May be required to attend local Tech Shows, to gather insight to DOD cybersecurity trends and on-going efforts, in order to provide advice and/or recommendations to the government on future equipment buys or documentation required in support of the mission.
  • May be required to attend planning meetings at other locations to obtain requirements for upcoming events.


Qualifications:

  • Knowledge of Air Force communication squadron culture, as well as a basic-to-intermediate technical knowledge in areas such as: endpoint security, network vulnerability scanning, insider threat, cyber hygiene, IT support functions, and cybersecurity resiliency.
  • Familiarity with DoD/DAF publications, end user policies and training requirements. I.e. Comply-to-connect policy
  • Familiarity with DoD/DAF compliance methods, such as well as STIGs and CCRIs.
  • Ability to communicate effectively with the Airmen and write SOPs that are intelligible to all audiences.
  • Ability to interpret complex technical ideas from technicians into documentation that can be understood by non-technical supervisors and commanders.
  • Possess/Acquire an understanding of how the SOPs will be utilized, such that the Technical Writer/Editor could train a new airman on how to use them (if necessary due to personnel deployments, TDYs, extensive leaves).
  • Ability to manage time efficiently to meet overarching completion deadlines due to volume of documentation and number of people that will be involved.
  • Bachelor's degree in cybersecurity, information science, technical writing, or other relative area of study.
  • At least 1 year of relevant experience supporting similar requirements for Department of
  • Defense mission area.
  • Active security clearance (Secret or above). Although most documentation will be on Unclassified systems, some documentation will require a Secret Clearance and access to SIPRNet.
  • Provide support to 6 CS Continuous Process Improvement events and adjust documentation to encapsulate any updates to IT support processes or document any IT support processes that were not previously defined.
  • Knowledge and solid understanding of common Microsoft Office365 tools


Benefits and Perks
In addition to competitive wages, Newberry Group offers an outstanding benefit package. This includes medical coverage with three plan options, dental and vision coverage, personal time off, paid holidays, paid parental leave, telecommuting if available, retirement savings accounts (Pre-Tax and Roth), flexible and dependent care savings accounts, life insurance, long and short-term disability coverage, tuition and training reimbursement, employee assistance program, and more.
The Newberry Group, Inc. is an Equal Opportunity Employer – EEO/AA/Disability/Veterans.

 

Similar Jobs

Chewy Logo Chewy

Marketing Analyst

eCommerce • Healthtech • Pet • Retail • Pharmaceutical
Hybrid
Plantation, FL, USA
17800 Employees
25-25 Hourly
In-Office
3 Locations
110 Employees
120K-180K Annually

Capital One Logo Capital One

Senior Associate - Senior Risk Associate, Supply Chain Solutions (Work From Home)

Fintech • Machine Learning • Payments • Software • Financial Services
Hybrid
8 Locations
55000 Employees
88K-100K Annually

CDW Logo CDW

Architect

Information Technology
Remote or Hybrid
US
15100 Employees
147K-211K Annually
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
Columbia, Maryland
94 Employees
Year Founded: 1996

What We Do

Established in 1996, Newberry Group has set out to create something altogether different: meeting the most challenging needs of both Public and Private Sector clients. We achieve this by providing superior services and exceptionally qualified professionals who create a unique experience for our clients in every engagement. Newberry brings strength to our client from the inside out through client intimacy and superior quality, presence and accountability in our relationships, and cross-sector leverage of public and commercial sector best practices.

Similar Companies Hiring

Scrunch AI Thumbnail
Software • SEO • Marketing Tech • Information Technology • Artificial Intelligence
Salt Lake City, Utah
Amplify Platform Thumbnail
Fintech • Financial Services • Consulting • Cloud • Business Intelligence • Big Data Analytics
Scottsdale, AZ
62 Employees
Standard Template Labs Thumbnail
Software • Information Technology • Artificial Intelligence
New York, NY
15 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account