Information System Security Officer #3377

Careers

  • US-AL-Huntsville
  • Cybersecurity & Intelligence
Apply Now
Company Overview

GovCIO is a team of transformers–people who are passionate about transforming government I.T. We believe in making a difference by developing digital strategies and delivering the technology-related innovation governmental operations that improve the citizen experience every day.

 

The ideal candidate will be responsible for:

Assisting the government in the assessment process for all new and legacy systems to determine the security requirements associated with each system. The contractor shall interact with both technical and non-technical personnel in order to conduct a comprehensive review of a system, network or application. This is a technical role requiring moderate to advanced knowledge of security engineering, the ATO process, enterprise monitoring, and incident response. The contractor shall assist in building or refining the program to achieve the assessment process. The contractor shall work with various elements of the cybersecurity team to understand roles, missions and requirements in order to inform this process.

 

  • Bachelor’s with 8+years(or commensurate experience)
  • At least 3 years serving as an Information Systems Security Officer (ISSO) at a cleared facility.
  • Experience working in a cloud environment such as (Azure, AWS, Google Cloud)
  • Minimum of 5 years work experience in a computer science or Information Assurance related field.
  • At least one of the following certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or other certifications exemplifying skill sets such as those described in DoD Instruction 8570.1 IAM Level III proficiency.
  • Familiarity with the use and operation of security tools including Tenable. Nessus and/or SecurityCenter, IBM Guardium, HP Weblnspect, or like applications and Network Mapper (NMAP).
  • A bachelor’s or advanced degree in Computer Science, Information Assurance, or other cyber discipline is preferred. 
  • Top Secret (TS) OR Top Secret (SCI Eligible)

All personnel assigned under this task order must possess current TS clearances and maintain them throughout the life of the contract. Personnel must be SCI eligible

But we can’t do it alone. We welcome and nurture an inclusive and diversified work culture. Because different backgrounds, experiences, abilities, and perspectives make us better decision-makers, problem solvers, and creators. We’re changing the face of I.T. – from our diverse staff to the end-products we develop. And we’re excited to expand our team. Are you ready to be a transformer?

Responsibilities

Correlates threat data from various sources to establish the identity and modus operandi of hackers active in client’s networks and posing a potential threat. Provides the customer with assessments and reports facilitating situational awareness and understanding of current cyber threats and adversaries. Develops cyber threat profiles based on geographic region, country, group, or individual actors. Produces cyber threat assessments based on entity threat analysis. May provide computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure,computer forensic analysis, data recovery, and network assessments. Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.

1.Collaborates with intrusion analysts to identify, report on, and coordinate remediation of cyber threats to the client.
2.Provides timely and actionable sanitized intelligence to cyber incident response professionals.
3.Leverages technical knowledge of computer systems and networks with cyber threat information to assess the client’s security posture.
4.Conducts intelligence analysis to assess intrusion signatures, tactics, techniques and procedures associated with preparation for and execution of cyber attacks.
5.Researches hackers, hacker techniques, vulnerabilities, exploits, and provides detailed briefings and intelligence reports to leadership.
#ZR #cjpost #dice

COVID Policy: New employees will be required to adhere to the Company’s and its clients’ COVID-19 safety procedures. In the event that the COVID-19 vaccination mandate for Federal Contractors is enforced, you must become fully vaccinated or request and be approved for an exemption. Employees working onsite at a client location must comply with our client’s COVID-19 requirements.

GovCIO is a team of professionals who want to make a difference. And that can only happen with a diverse, happy, and cared-for team. So, we prioritize your well-being, equity for all and look for ways to make work a better place for each of us every day.

We are an Equal Opportunity Employer. All qualified applicants receive consideration for employment without regard to race, ethnicity, religious affiliation, gender, gender identity or expression, sexual orientation, national origin, or disability status. EOE AA M/F/Vet/Disabled

Apply Now

Not The Right Fit?

Is this not the job you’re looking for? That’s ok! We’ve got plenty of other opportunities for you to peruse. Search all of our open positions by your area of interest or location.

View All Jobs