Information System Security Officer ISSO III (Government)



AT&T Public Sector
View Company Profile

<< Go back

Post Date: May 31, 2022
Location: Virginia - Chantilly
Security Clearance: Top Secret - SCI,Top Secret w/ CI Poly
Job Type: Permanent
Start Date: - n/a -
Salary: - n/a -
Job Reference: 2222795
APPLY NOW
    Email Job to a Friend     Save Job to Inbox     Printer Friendly

Description

AT&T Global Public Sector is a trusted provider of secure, IP enabled, cloud-based, network solutions and professional services to the Federal Government.   We are dedicated to recruiting, developing and empowering a diverse, high-performing workforce that is passionate about what they do, committed to our shared values and dedicated to our customers’ mission.



Our Cyber Security Team supports the customer by investigating, analyzing, and mitigating cybersecurity incidents that attempt to breach the Customer’s network infrastructure, applications, and operating systems.



AT&T has an opening for ISSO 3 to support the  HIDALGO PROGRAM in providing compliance engineering support at the enterprise level.



Job Duties/Responsibilities:   




            
  • ISSOs shall provide comprehensive information system security support to NRO Directorates and Offices.

  •         
  • An ISSO is responsible to the Information System Security Manager (JSSM) for providing the day-to-day system security operations by ensuring that operational security is maintained for an information system (IS).

  •         
  • ISSOs are also responsible for maintaining effective communications with the ISSM. PSO.

  •         
  • Information System Owner, Authorizing Official (AU) or Delegated Authorizing Official (DAO), Information System Security Engineer (ISSE), and the Security Control Assessor (SCA).

  •         
  • ISSOs must have a working knowledge of system functions, security policies, technical security safeguards, and operational security measures.



Required Clearance: TS/SCI with polygraph. (#ts/sci) (#polygraph)



Required Qualifications: Candidate must have a bachelor’s degree and 8 years of experience that can be a combination of work history and education. This equates to a master’s and 5 years, Bachelors and 8 years, or Associates and 12 years. Must meet minimum requirements for DoD 8570 IAM Level 3 certification requirements.



Desired Qualifications:




            
  • Thorough understanding and application of network security principles, practices, and implementations.

  •         
  • Working knowledge of cross-functional integration of information systems into a physical security environment.

  •         
  • Working knowledge of system functions, security policies, technical security safeguards, and operational security measures.

  •         
  • Understanding of system methodologies including but not limited to client server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, LAN, switches, and routers.

  •         
  • Familiarity with detecting and preventing computer security compromises in a networked environment.

  •         
  • Working knowledge of configuration management; system maintenance; and integration testing.

  •         
  • Proficient in the use of tools used to prevent and/or negate malicious code.

  •         
  • Understanding of COTS tools that scan at the physical layer of all removable and fixed media types including but not limited to: (CDs, hard drives, thumb drives, Zip/Jazz, etc.).

  •         
  • Ability to decipher and explain in clear language Intelligence Community Directive (ICD) 503.

  •         
  • Ability to support forensics and evidentiary preservation.

  •         
  • Ability to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data.

  •         
  • Demonstrated ability to translate technical information and information technology jargon into plain English.

  •         
  • Ability to apply a risk management philosophy when faced with security challenges and the ability to articulate the pro’s and con’s in a clear concise manner.

  •         
  • Demonstrated proficiency with the following computer operating systems (e.g. Microsoft Windows, LINUX, UNIX, Mac OS, etc.).

  •         
  • Analytical ability to decipher complex technical configuration management documents.

  •         
  • Demonstrated proficiency with database maintenance.

  •         
  • Strong ability to elicit, articulate, and document information in a well-organized manner.

  •         
  • Demonstrated experience with Microsoft Office Suite.

  •         
  • Working knowledge of all applicable NRO, IC, DoD policies, procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM).

  •         
  • Excellent communication, interpersonal, and team-building skills to engender rapport with the military personnel, civilians, and other contractors at all levels.

  •         
  • An ability to prioritize work to meet deadlines, and to manage the workflow of the ISSO team.

  •         
  • Demonstrated ability to correlate audit results between various systems and/or users and notify the ISSM of any discrepancies.

  •         
  • Expertise with configuration management; system maintenance; and integration testing.

  •         
  • Ability to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data.

  •         
  • Expert in the use of tools used to prevent and or negate malicious code.

  •         
  • Expert in detecting and preventing computer security compromises in a networked environment.

  •         
  • Expertise in forensics chain of custody and evidentiary preservation.

  •         
  • Demonstrated proficiency in successfully guiding complex information systems through assessment and authorization control gates.

  •         
  • Analytical abilities to decipher complex technical configuration management documents.

  •         
  • Proficient in maintaining databases.

  •         
  • Thorough working knowledge of all applicable NRO, IC, DoD policies, procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM).

  •         
  • Demonstrated ability to work independent of close supervision.

  •         
  • Expert ability to establish and maintain effective internal and external working relationships with government and contractor program managers, security professionals, and mission partners.

  •         
  • Ability to effectively provide ISSO guidance to Level 1 and Level 2 ISSOs.



Ready to join our team?  Apply today!











Powered by Jobbex