Information security support officers are security principal agents who enforce DoD policy compliance within their area of responsibility. Assist in the preparation, distribution, coordination and maintenance of plans, instructions, policies, guidance and standard operating procedures necessary for implementation of the organization’s IA program, and serve as the subject matter focal point. Responsible for the planning, staffing, leading, communicating, monitoring and maintaining the organization’s Information Assurance IT enterprise policies. IA technician shall maintain the confidentiality, integrity, availability, certification and accreditation of all UNIT systems and data in accordance with Federal DoD laws, regulations, guidance, and standards. In addition, enforce the organization’s information security program based on DoD best business practices (BBPs) and make recommendation.
The ISSO will report non-compliance to the supported Information Assurance Manager (lAM) per established organizational policy and procedures. Assist the IAM in Certification and Accreditation package is prepared and maintained in accordance with (lAW) Information Assurance Certification and Accreditation Process (NIST RMF). Maintain a mobile data-at-rest management program and automation inventory program of all area of responsibility (AOR) automation equipment. ISSO shall administer proper security labeling, classification, creation, destruction, and inventory asset management of all information system devices and media within area of responsibility. Contractor shall build, install, maintain, and assist with disposal of UNIT IT systems IAW applicable regulations and policies. Utilize portal or knowledge management repositories to provide relevant cyber security information for end-users. Administer all UNIT cross domain transfers and systems authorization and Access Requests. Manage an efficient and effective security, education, training, awareness (SETA) program and ensuring appropriate account level access. ISSO’s will utilize Defense Ready (Automation Tool) to review, manage, & track cyber challenge end-user training & privilege user 8570.01m certification requirements. In coordination with the computer network defense team, ISSO will support incident handler efforts for all cyber security event remediation and/or computer forensics requirements. Advisor to IAM.
Knowledge, Skills and Abilities
Must have a Top Secret-SCI security clearance
Lift over 35 LBS
The work is performed in an office setting. Occasional and intermittent travel for official purposes is required.
Bachelors Degree in Computer Science or a related technical discipline; or the equivalent combination of education; professional training or work experience.
5-8 years of related experience in data security administration.
ITIL v3 Certification preferred
DoDI 8570.01m Certification required
For more than 50 years, General Dynamics Information Technology has served as a trusted provider of information technology, systems engineering, training and professional services to customers across federal, state, and local governments, and in the commercial sector. Over 40,000 GDIT professionals deliver enterprise solutions, manage mission-critical IT programs and provide mission support services worldwide. GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
#DPOST #CJPOST #ARMA #JSOC
Software Powered by iCIMS