SENIOR ISSO


Concurrent Technologies Corporation
Huntsville, AL 35824
United States

Manages Others
No
Experience Required
Yes
Degree Required
Yes
Security Clearance Required
Yes obtain/maintain secret
Employment Type
Employee
Work Schedule
Full-Time

Job Description


 
SENIOR ISSO
Concurrent Technologies Corporation
Huntsville, AL
Minimum Clearance Required: Secret Clearance
Clearance Level Must Be Able to Obtain: Secret
Clearance
CTC stays ahead of the latest technology advancements
so we can help solve our clients’ toughest challenges. As a part of the
Information Technology (IT) Division, you will be strengthening our team of
world-class experts aimed at providing our clients with the most effective
solutions. Our expertise in achieving missions is unmatched, and we continue to
have a major positive impact throughout the Department of Defense (DoD),
Intelligence Community (IC), and beyond. Our IT solutions are at work in high-level,
high-priority areas of the DoD and U.S. Government agencies. We are leaders in
artificial intelligence and machine learning, cloud architecture and security,
cross domain solutions, cybersecurity, edge node technology, synthetic
environments, and more. We are honored to be a trusted provider of cutting-edge
and customized solutions to our clients for decades. Our experts are leading
the rapidly evolving IT industry with innovative work in a variety of
disciplines, including DevSecOps, which underpins many of our efforts. With
CTC’s IT Division, you become part of a dedicated team committed to advancing
the ever-growing possibilities in IT and meeting our clients’ challenges with
up-to-the-minute, customized, and powerful solutions
Key Responsibilities:
·As an ISSO, Lead security
planning, assessment, risk analysis, risk management, certification, security
awareness, system administration, networking, maintenance, and continuous
monitoring of Windows and Linux accredited workstations, systems, and Clouds.
·Provide support for implementing
and enforcing information systems security policies, standards, and
methodologies.
·Assist in the evaluation of
security solutions to ensure they meet security requirements for processing
multiple types of information as well as provide the CM for information system
security software, hardware, and firmware.
·Provide support to the
Information System Security Manager (ISSM) for maintaining the appropriate
operational IA posture for a system, program, or enclave and develop/maintain
documentation for A&A using the DoD Risk Management Framework (RMF) and document
within Enterprise Mission Assurance Support Service (eMASS).
·Develop and update the system
security plans, Plan of Action and Milestones (POAM’s) and other IA
documentation.
·Maintain all records on
workstations, servers, routers, firewalls, intelligent hubs, network switches,
etc. to include system upgrades.
·Evaluate security solutions to
ensure they meet security requirements for processing classified information
and maintain operational security posture for an information system or program.
·Develop system security policy
and ensure compliance and administer the user identification and authentication
mechanisms of the Information System (IS).
Basic Qualifications:
·Possess a minimum of a BA/BS
Degree in a Computer Science, Computer Information Systems, Management
Information Systems or a related field plus 5-7 years of directly related
experience.
·Working knowledge of system
security design process, defense-in depth/breadth, information security
domains, identification, authentication, risk management, contingency planning,
incident handling, configuration control, change management, auditing, RMF/ICD
503 process, and principles of IA (confidentiality, integrity, non-repudiation,
availability, access control).
·Demonstrate knowledge of and
experience with at least one of the following (preferably more): current
security tools; hardware/software security implementation; communication
protocols; encryption techniques/tools.
·Demonstrate experience
performing system administration duties for Linux/windows servers and virtual
machines
·Experience completing security
evaluations of software systems or architectures to ensure they meet security
requirements for processing classified information.
·Experience preparing and
maintaining SSPs or security related documentation.
·Experience proposing,
coordinating, implementing, and enforcing information systems security
policies, standards, and methodologies
·Experience using Enterprise
Mission Assurance Support Service (eMASS) application for fully integrated
cybersecurity management.
·Provide support to Information
System Security Manager (ISSM) for implementing, and enforcing information
systems security policies, standards, and methodologies.
·Demonstrated experience
performing day-to-day security operations of information processing systems.
·Must be committed to developing
and adhering to best practices.
·Must be a solutions-oriented
team player and must possess a high level of self-initiative and drive.
·Must have excellent
interpersonal skills and strong skills in communicating technical information.
Preferred Qualifications:
·Experience in the administration
of cloud-based systems, software, and accreditation.
·Shell Scripting knowledge such
as Power shell, python and Bash experience will be helpful.
·Security+ or CISSP certified.
Why CTC?
Our teams at CTC are passionate and thrive on collaboration in a team environmentWhen we encounter a difficult problem, we have a variety of talented and diverse employees that work together to solve the toughest challengesCompetitive salary and benefits packageAlthough our work at CTC is extremely important, we also recognize the need for our employees to maintain a proper mix of work and personal lifeVisit www.ctc.com to learn more
Join us!CTC offers exceptional career growth, cutting edge technology,
educational opportunities, and recognition for quality work.
https://concurrent-technologies-corporation.breezy.hr/
Email: careers@ctc.com
Staffing Requisition: SR#2024-0159
“We are an equal opportunity employer, and
all qualified applicants will receive consideration for employment without
regard to race, color, religion, sex, sexual orientation, gender identity,
national origin, age, disability status, protected veteran status, or any other
characteristic protected by law.”
​​
Job Requirements
Basic Qualifications:
• Possess a minimum of a BA/BS Degree in a Computer Science, Computer Information Systems, Management Information Systems or a related field plus 5-7 years of directly related experience.
• Working knowledge of system security design process, defense-in depth/breadth, information security domains, identification, authentication, risk management, contingency planning, incident handling, configuration control, change management, auditing, RMF/ICD 503 process, and principles of IA (confidentiality, integrity, non-repudiation, availability, access control).
• Demonstrate knowledge of and experience with at least one of the following (preferably more): current security tools; hardware/software security implementation; communication protocols; encryption techniques/tools.
• Demonstrate experience performing system administration duties for Linux/windows servers and virtual machines
• Experience completing security evaluations of software systems or architectures to ensure they meet security requirements for processing classified information.
• Experience preparing and maintaining SSPs or security related documentation.
• Experience proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies
• Experience using Enterprise Mission Assurance Support Service (eMASS) application for fully integrated cybersecurity management.
• Provide support to Information System Security Manager (ISSM) for implementing, and enforcing information systems security policies, standards, and methodologies.
• Demonstrated experience performing day-to-day security operations of information processing systems.
• Must be committed to developing and adhering to best practices.
• Must be a solutions-oriented team player and must possess a high level of self-initiative and drive.
• Must have excellent interpersonal skills and strong skills in communicating technical information.

Employer
Concurrent Technologies Corporation
Karen Anderson
100 CTC Drive
Johnstown PA 15904
United States

View Count 10
Please do not respond to suspicious job offers.