Sr. ISSO (FS Poly)

Posted 21 Days Ago
Be an Early Applicant
Fort Meade, MD
In-Office
Expert/Leader
Big Data • Security • Software
The Role
As a Senior ISSO, the candidate will support and enforce security policies, conduct vulnerability assessments, and manage information system security in complex environments.
Summary Generated by Built In

Please NOTE: Full Scope Poly is required for this role.
Senior Information System Security Officer (ISSO)
The selected candidate will act as an ISSO for a large software development program which includes software maintenance and development, IT support (Network/Workstation/Server) systems integration and life cycle support, enterprise application development, network engineering, and information systems security (ISS). The candidate will work with other security professionals in developing and implementing strategies to detect and mitigate threats to information systems, protect critical data sets, and provide assessments of system and network vulnerabilities.
Primary Roles and Responsibilities

  • Provide support for implementing and enforcing information systems security policies, standards, and methodologies.
  • Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information.
  • Assist with the Configuration Management for information system security software, hardware, and firmware.
  • Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation.
  • Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades.
  • Evaluate security solutions to ensure they meet security requirements for processing information.
  • Maintain operational security posture for information systems.
  • Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system/program/enclave.
  • Develop and maintain documentation for Certification & Accreditation in accordance with specified policies.
  • Develop and update system security plans and other IA documentation.
  • Provide support for Information Assurance Vulnerability Alerts (IAVAs) management (initiating IAVA responses and system security scans, completing remediation, extending IAVA patches and security updates to designated sites, etc.)
  • Provide CM for security‐relevant information system software, hardware, and firmware. Develop system security policy and ensure compliance.
  • Administer the user identification and authentication mechanisms of the Information System.
Basic Qualifications
  • Must have at least 10 years of experience as ISSO working independently, and/or on teams maintaining secure information system operations in isolated, connected and standalone environments.
  • Must have at least 5 years of experience using tools to support IAVA management.
  • Must have at least 5 years of experience using tools to support the preparation, maintenance, and management of SSPs and other security related documentation.
  • Demonstrated knowledge of and experience with several of the following: current security tools; hardware/software security implementation; communication protocols; encryption techniques/tools.
  • In‐depth experience completing security evaluations of software systems or architectures to ensure they meet security requirements.
  • In‐depth experience proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies, preferably on a large software or IT program.
  • Demonstrated experience performing day‐to‐day security operations of large, complicated information and information processing systems.
  • Must be committed to developing and adhering to best practices.
  • Must possess a high level of self‐initiative and must be a solutions‐oriented team player.
  • Must have excellent interpersonal skills.

Preferred Qualifications

  • Bachelor's degree in a related field and at least 12 years of relevant experience.
  • Extensive experience as an Information Systems Security Officer on large software development and integration programs.
  • DoD 8570 compliance with IAT Level II or higher.
  • DoD 8570 compliance with IAM Level II or higher.

Who we are...   

August Schell offers 30 years of experience in providing our customers innovative solutions and engineering services to their most challenging needs. We thrive on navigating complex IT difficulties and are driven to find the best solutions for our customers. Our team delivers expert knowledge in cyber security, big data, endpoint security and cloud solutions. Our ability to serve our customers with continued excellence is a direct reflection of our dedicated and exceptional people. At August Schell, we are not only a team, we are family.

Top Skills

Configuration Management Tools
Encryption Techniques
Iava Management Tools
Networking Hardware
Security Tools
Am I A Good Fit?
beta
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: Rockville, MD
84 Employees
Year Founded: 1991

What We Do

August Schell is dedicated to delivering agile and innovative cybersecurity solutions to proactively defend and protect organization’s data against cyber attacks. Through our proven expertise with cybersecurity services and solutions, we are masters at designing, deploying and implementing highly secure solutions for on-premise and cloud based computing environments.

We offer a wide range of next-generation products and services for:

- Enterprise-Scale Identity Management, including Derived Credentials for Mobility
- Big Data, including Security and Visualization related to Big Data
Network Security and Visibility
- Operational Intelligence
- Data Center Security, including Firewalls, Endpoint Awareness/Management, and Virtualization
- Cloud Security and Visibility
- Application and Data Security
- Software-Defined Data Center (SDDC), including Compute, Storage, Network & Backup

We understand how critically important it is to defend critical digital assets and sensitive data from the constant threat of cyber attacks. We do not take this responsibility lightly and it’s with integrity that August Schell has defined our approach to our customers, without boundaries.

Similar Jobs

CrowdStrike Logo CrowdStrike

Sr. Director, Field Sales - DoD and Intel Community Sales (Remote)

Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Remote or Hybrid
3 Locations
10000 Employees
175K-235K Annually

CrowdStrike Logo CrowdStrike

Principal Engineer

Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Remote or Hybrid
37 Locations
10000 Employees
195K-290K Annually

CrowdStrike Logo CrowdStrike

Account Executive

Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Remote or Hybrid
3 Locations
10000 Employees
130K-175K Annually

CrowdStrike Logo CrowdStrike

Regional Sales Manager

Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Remote or Hybrid
3 Locations
10000 Employees
130K-175K Annually

Similar Companies Hiring

PRIMA Thumbnail
Travel • Software • Marketing Tech • Hospitality • eCommerce
US
15 Employees
Scotch Thumbnail
Software • Retail • Payments • Fintech • eCommerce • Artificial Intelligence • Analytics
US
25 Employees
Milestone Systems Thumbnail
Software • Security • Other • Big Data Analytics • Artificial Intelligence • Analytics
Lake Oswego, OR
1500 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account