| Overview 
 
 TUNUVA Technologies (a wholly owned subsidiary of VTG) seeks to hire a Senior Information Systems Security Officer (ISSO) to monitor and maintain systems security on operational systems such as malicious code eradication, configuration management, assessment and authorization of current and future systems, as well as to review and revise systems security documentation on proposed systems. Senior ISSOs apply extensive knowledge and experience of a variety of information systems security concepts, practices, and procedures. What will you do?
 
 
 Responsibilities 
 Provide guidance and mentorship to junior team membersCollaborate with system stakeholders and teammates to enhance system securityCommunicate effectively with all security stakeholdersCreate, revise, or review cybersecurity documentationProactively identify opportunities for increasing customer value and engagementAct as a Data Transfer Agent between systems of varying security domainsInventory, track, and control removable media and portable electronic devicesAdvise stakeholders on NIST SP 800-37 Risk Management Framework (RMF) workflows and requirementsReview SIEM and RMF workflow tools to advise ISSM on system security baselines and authorization statusesAdvise system stakeholders on acceptable use and applicable cybersecurity policy or regulationProperly report and document security incidents and response actions
 Do you have what it takes?
 
 
 Requirements 
 Clearance: Active TS/SCI with PolygraphCurrently hold or obtain and maintain DoD 8570 IAT-3 certification within 6 months of starting the position Applicants should possess education and experience at the appropriate level for the position. Education relevant to computer engineering, information security, information management, and/or computer science. Experience relevant to information technology security, information systems security, information assurance engineering, and systems administration.Bachelor's degree + 6 years of experience OR High School/GED + 10 years of experience OR Associate's degree + 8 years of experience OR Master's degree + 4 years of experience Desired Qualifications 
 Working knowledge of cross-functional integration of information systems into a physical security environmentWorking knowledge of system functions, security policies, technical security safeguards, and operational security measuresFamiliarity with detecting and preventing computer security compromises in a networked environmentWorking knowledge of configuration management; system maintenance; and integration testingProficient in the use of tools used to prevent and/or negate malicious codeUnderstanding of Commercial-Off-the-Shelf (COTS) tools that scan at the physical layer of all removable and fixed media types including but not limited to: (CDs, hard drives, thumb drives, Zip/Jazz, etc.)Ability to explain in clear language Intelligence Community Directive (ICD) 503Ability to support evidentiary forensics and preservationAbility to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive dataDemonstrated ability to translate technical information and information technology jargon into plain EnglishAbility to apply a risk management philosophy when faced with security challenges and the ability to articulate the pro's and con's of a particular solution in a clear concise mannerDemonstrated proficiency with computer operating systems (e.g., Microsoft Windows, LINUX, UNIX, Mac OS, etc.)Strong ability to elicit, articulate, and document information in a well-organized mannerDemonstrated ability to work independent of close supervisionWorking knowledge of all applicable customer, IC, and DoD policies, procedures and operating instructions related to cybersecurityExcellent communication, interpersonal, and team-building skills to engender rapport with the military personnel, civilians, and other contractors at all levelsAn ability to prioritize work to meet deadlines, and to manage the workflow of an ISSO teamDemonstrated ability to correlate audit results between various systems and/or users and notify the Information Systems Security Manager (ISSM) of any discrepanciesExpertise in detecting and preventing computer security compromises in a networked environment |