Information Systems Security Officer - Security Clearance Eligibility
AVT Simulation
2021-12-03 07:32:10
Orlando, Florida, United States
Job type: fulltime
Job industry: I.T. & Communications
Job description
Ready for a culture shock? With a relaxed dress code, flexible scheduling, and an approachable senior management team who are open to hearing your feedback: were not your traditional corporate culture. Operating more like a family than a small business, were continually looking for ways to help our employees, as well as provide a great work environment.
Every day, we get to work doing the same thing as the day before: making the training for our military faster, better, and cheaper. It was true at the inception of AVT Simulation and its just as true today.
Our mission is what drives us to do everything possible to get more effective training to those who need it the most. We do that by building a talented, diverse team that makes a positive impact on our company and our work.
Job Summary The Information Systems Security Officer (ISSO) is responsible for classified/Unclassified programs Cybersecurity/Risk Management Framework (RMF) posture in accordance with government directives and program requirements. The ISSO closely interfaces and collaborates with government customers, system owners, Cybersecurity/Information Assurance (IA) professionals, System Administrators, engineering community on compliance and configuration change management. The ISSOs primary focus is ensuring the confidentiality, integrity, and availability of information systems. The ISSO is a vital contributor to the program and operates in a highly dynamic and fast-paced environment.
Responsibilities/Duties/Functions/Tasks
- Leads Cybersecurity/IA efforts by establishing or validating the system, its functions, information types operating environments, and security requirements
- Coordinates with Government, customers, partners, and Authorization Officials (AO) to prepare systems for Assessment & Authorization (A&A) in accordance with established NIST guidelines
- Creates and Maintains A&A/RMF documentation: Security Plan, Plan of Action & Milestones (POA&M), Software/Hardware Inventory, Network diagrams, Risk Assessment Report, Security Assessment Plan and Report; Contingency Plan, Incident Response Plan, and Configuration Management
- Monitors and refines cybersecurity requirements and ensures that the requirements are effectively integrated into information systems throughout the System Development Life Cycle (SDLC)
- Provides continuous security monitoring of unclassified/classified systems
- Applies current computer science technologies to the development, evaluation, and integration of computer systems and networks to maintain system security for unclassified/classified information systems
- Develops and maintains all DoD requirements, including the DAAPM & Risk Management Framework (RMF) standards to ensure compliance with the National Industrial Security Program Operating Manual (NISPOM)
- Assist in the development and implementation of policies and System Security Plans supporting government agency requirements
- Works in a fast-paced production environment with the ability to handle multiple competing tasks and demands simultaneously.
- Conducts security control assessments; reviews the adequacy of the security controls and their ability to protect the system and its information; tailor the security controls to ensure compliance
- Supports cybersecurity activities concerned with technical development, scheduling, and resolving engineering design and test problems.
- Participates in proposal efforts containing Cybersecurity/IA-related SOW/tasks to address scope, capability, cost, schedule, and resources
- Reads, interprets, and implements Cybersecurity/IA regulations and requirements; develop and maintain managerial, operational, and technical Cybersecurity/IA skillset
- Collaborates with security managers (both government and local), other SSEs and SSMs to define, improve, implement and maintain information security policies, strategies, and procedures
- Supports Corporate-wide Security initiatives
Qualifications Minimum Requirements
- Bachelor s Degree, ideally in Information System Security, Computer Science, Cybersecurity, or equivalent related experience
- 8+ years of hands on experience in System Security, or Cybersecurity/Risk Compliance
- Certifications: CISSP, CISA, CISM, CASP, CEH, and/or Security+
- Completion of the DSS CDSE/STEPP RMF Training
- Must have an in-depth knowledge of the security authorization processes and procedures as define in the Risk Management Framework and be familiar with the CNSSI1253, NIST SPs 800-37, 800-53, etc.
- Must have experience in several of the following areas: knowledge of current security tools, hardware/software security implementation; different communication protocols; and encryption techniques/tools
- Substantial communication and interpersonal skills to advise customers of DoD and company industrial security policies and procedures
- Experience with development documentation for systems down to the technical component, software, firmware, and interface level
- Demonstrates ability to follow engineering processes and verify technical requirements
- Ability to work under pressure and with limited supervision, and work well with others in a large and diverse environment
- Ability to successfully prioritize and manage to completion multiple complex tasks and deliverables, and demonstrate the highest degree of integrity and accountability in all actions
- Excellent written and spoken communication skills for documentation, intra-team, and interdisciplinary communication.
- Able to focus on multiple projects at once.
- Organized and detail-oriented
- Ability to operate in a high-paced work environment
While performing the duties of this job, the employee is occasionally required to stand; walk; sit; use hands to finger, handle, or feel objects, tools or controls; reach with hands and arms; talk or hear. The employee must occasionally lift or move office products and supplies, up to 10 pounds.
Occasional travel
Equipment/Software/Tools Used
- Computer, phone, photocopiers, and fax machines
- Experience managing Linux, Windows 10 DOD accredited information systems
- Experience with the SCAP Compliance Checker and the DISA STIG Viewer
- Experience with Assured Compliance Assessment Solution (ACAS) Vulnerability scanner
- Microsoft Office Applications (Word, Excel, PowerPoint)
- Microsoft Project
*Candidate has capacity to comply with the federally mandated requirements of U.S. export control laws.
Our Heritage:
Founded in 1998 by an engineer, AVT Simulation is an Orlando-based, end-to-end systems integration and full-service modeling and simulation small business. Since our beginning, AVT's highly specialized staff of engineers has included some of the top leaders in the simulation industry. With an average of over 20 years of simulation experience, our dedicated staff provides specialized solutions for customers requiring on point solutions to complex problems.
AVT has always been a company that strives to make a positive difference in the lives we touch. These lives include our employees and their families, our partner companies and their employees, and ultimately the warfighters receiving our products and services. Our core values are so very important to us as a company. They guide us towards success. They make us a great company to work for and a strong partner to work with.
- People First
- Mission Excellence
- Do the Right Thing
- Commitment
People First is our first and most important core value because we firmly believe the success of AVT is directly related to supporting our employees. We have a lot of fun (with regular employee events and engagements), while still working hard to accomplish our mission of serving our military and the warfighter.
We're looking for candidates that embody these core values, know how to have fun while working hard, and think they would thrive in an environment like ours. If you're a self-motivated individual, then come join AVT. Come make your difference.
EOE - Females/Minorities/Protected Veterans/Individuals with Disabilities/Sexual Orientation/Gender Identity
Qualified individuals with a disability have the right to request a reasonable accommodation. If you are unable or limited in your ability to use or access our careers website as a result of your disability, request a reasonable accommodation by visiting and follow the instructions at the bottom.
Powered by JazzHR
PI