Information System Security Officer (ISSO) I

Cyber Security/Information Assurance El Segundo, California


Description

The ISSO’s primary function is working within Special Access Programs (SAPs) supporting SMC and AFSPC mission areas. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.

 Performance shall include:

  • Review, prepare, and update AIS accreditation packages
  • Notify customer when changes occur that might affect AIS accreditation/certification
  • Perform AIS self-inspections, provide security coordination and review of all system test plans
  • Identify AIS vulnerabilities and implement countermeasures
  • Represent the customer on various technical review and inspection teams
  • Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system accreditation packages
  • Coordinate, prepare, and track AIS inspections, reports, and responses
  • Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities
  • Prepare reports on the status of security safeguards applied to computer systems
  • Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices
  • Perform ISSO duties in support of in-house and external customers
  • Assist Department of Defense, National Agency and Contractor organizations with the development of certification and accreditation (C&A) efforts
  • Review, track, and conduct AIS training

 Experience:

  • 1 -2 years related experience; minimum 1 year of SAP-related experience highly desired.

 Education:

  • Bachelor’s degree or equivalent additional experience (4 years)

 Certifications:

  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire
  • Must complete training on Joint Security Implementation Guidance (JSIG) and Risk Management Framework (RMF) Information Security Continuous Monitoring (ISCM)

 Security Clearance:

  • Current Top Secret Clearance with active SCI Eligibility
  • Eligibility for access to Special Access Program Information
  • Willingness to submit to a Counterintelligence polygraph