Company

HII Nuclear Inc.See more

addressAddressLos Alamos, NM
type Form of workFull-Time
CategoryInformation Technology

Job description

Job Description

Essential Duties/Responsibilities (may include, but not limited to):


The Information Systems Security Officer (ISSO) will be responsible for ensuring development and proper implementation of the security controls documented in the Systems Security Plan (SSP) for all Information Systems for which the ISSO is responsible at N3B, including sensitive unclassified networks supporting business, special purpose, and security functions. The ISSO provides certification documentation to the N3B Information Systems Security Manager (ISSM) for all information system accreditations and performs other duties as required to implement the Cyber Security programs necessary to support U.S. Government regulatory requirements, (DOE/NNSA, NRC, etc.). In addition to the duties required to maintain SSPs, the ISSO is also responsible for security operations duties, including proactively monitoring event sources for anomalies, conducting vulnerability assessments, incident response activities, firewall administration, and being an all-star problem solver. The candidate will be responsible for the following scope of work duties:



  • While working to achieve N3B LLCC objectives, will ensure all activities and operations are performed in a safe and deliberate manner; will maintain required safety, security and operational training; assure procedural and regulatory compliance; and make safety, security and quality an integral part of every task; including taking the necessary steps to stop work if continuing the job is unsafe or compromises security.



  • Ensures implementation of protection measures documented in the SSP for each information system for which they are the ISSO. Maintain the SSP and associated artifacts, including risk assessments, Privacy Impact Assessments, vulnerability assessments, Plans of Action and Milestones (POA&Ms), etc.



  • Ensures that security controls for information system resources are based on the least privilege principle and develops alternative solutions to mitigate risk when the most desirable security controls cannot be fully implemented.



  • Identifies, in coordination with the ISSM, and documents in the SSP, unique threats to Information Systems for which they are responsible.



  • Provides technical assistance with the initial set-up, secure deployment, and proper management of systems that support information security including virus detection, application whitelisting, centralized logging, data loss prevention, and intrusion detection systems.



  • Performs risk assessments and tests of new technology platforms and leads the implementation of standard security configurations, (ex: DISA STIG, CIS Benchmarks, etc.), prior to production deployment.



  • Utilizes vulnerability assessment software and related tools to immediately highlight errors in systems configuration, the need for the update of software with fixes and patches, and other security related changes.



  • Ensures the implementation of procedures as defined in the Cyber Security Program Plan (CSPP) and the SSP for each information system for which they are the ISSO.



  • Serves as an active member of the Cyber Security Incident Response Team (CSIRT) and participates in security incident response efforts by directing first responders to triage an event and performing advanced response actions for escalated events.



  • Ensures that information access controls and cyber protection measures are implemented for each information system as described by the SSP.



  • Ensures that users and System Administrators are properly trained in information system security by identifying cyber security training needs and the personnel who need to attend the cyber security training program. Supports awareness training of the workforce on information security standards, policies, and best practices.



  • Conducts cyber security reviews and tests to ensure that cyber security features and controls are functioning and effective.



  • Performs administration of the centralized logging platform, develops custom dashboards to monitor security status of the environment, and produces periodic reports of key performance indicators and key risk indicators to support Cyber Security metrics at the executive and operational levels



  • Redesigns and reengineers internal information handling processes so that information is appropriately protected from a wide variety of problems including unauthorized disclosure, unauthorized use, inappropriate modification, premature deletion, and unavailability



  • Develops technical documentation describing the deployment, configuration, and management of shared, networked, and multi-user information security systems



  • Regularly attends conferences, professional association meetings, and technical symposia to remain aware of the latest information security technological developments



Minimum Qualifications:



  • Candidate must have prior experience performing risk assessments, developing security plans, implementing DISA STIGs, and developing Standard Security Configuration Guides or similar technical products



  • Must have an understanding of open-source and other tools to assist in detection, prevention and analysis of security threats.



  • Must have a working knowledge of system functions, firewall administration, cyber security policies, and cyber security protection requirements



  • Must have experience in at least 2 of the following technology vendors: Cisco FirePower, CarbonBlack, Cylance, DataLocker, Entrust, FireEye, ivanti, Tenable, and/or Zscaler.



  • Must have excellent communications skills, especially technical report writing; candidates are encouraged to submit a sample of a technical report authored by the candidate



  • Must have one or more of the following certifications: GSEC, CEH, CISSP, CISA, GCIH, OSCP



  • Must be able to maintain confidentiality when working with sensitive information.



  • All qualified applicants will be considered; however, the successful candidate must be able to obtain and maintain a Q clearance from the United States Department of Energy.




Education and Experience Required:



Bachelors' degree in Information Systems, Computer Science, Management Information Systems, or a related discipline combined with at least 2 years of experience to include technical skills and experience with the following: Splunk administration, network intrusion detection system (IDS) administration, Active Directory and Group Policy Objects, Anti-virus administration consoles, Data Loss Prevention (DLP) systems, Microsoft Windows operating systems, Linux operating systems and advanced cyber security toolkits, malware analysis, penetration testing, and digital forensics tools; however, a combination of education and relevant experience wherein the knowledge, skills and abilities to perform the position’s duties and responsibilities have been adequately demonstrated is acceptable. The job level will be determined based upon relevant education, knowledge, skills, and abilities demonstrated at the time of the interview.


The career level of the position will be determined by the years of relevant experience, knowledge, skills, and abilities; after a candidate has been chosen.


Working Conditions and Physical Requirements (Sedentary Work):



Sedentary Work Category – The employee exerts up to 10 pounds of force occasionally and/or a negligible amount of force frequently or constantly to lift, carry, push pull or otherwise move objects, including the human body. While performing the duties of this job, the employee is regularly required to talk or hear. The employee is frequently required to stand, walk, sit, use hands to touch or feel, and reach with hands and arms. The employee is occasionally required to stoop, kneel, crouch, or crawl. Specific vision abilities required by this job include close vision and distance vision. The noise level in the work environment is usually quiet to moderate.


This job description reflects management’s assignment of essential functions; and nothing in this herein restricts management’s right to assign or reassign duties and responsibilities to this job at any time.

Individuals must be able to perform the essential functions of the job with or without reasonable accommodation.


We are an Equal Opportunity Employer and we do not discriminate based on race, color, religion, national origin, sex, disability, sexual orientation, veteran status or age
Refer code: 7614979. HII Nuclear Inc. - The previous day - 2024-01-03 16:42

HII Nuclear Inc.

Los Alamos, NM
Popular Information System Security Officer jobs in top cities

Share jobs with friends

IA/ISSO (Information Assurance/Information Systems Security Officer)

Systems Application & Technologies Inc

Orogrande, NM

3 months ago - seen

Information Systems Security Officer (Cybersecurity Technical Staff 2/3)

Los Alamos National Laboratory

Los Alamos, NM

5 months ago - seen

Information Systems Security Officer

ManTech International Corporation

Albuquerque, NM

6 months ago - seen

Information System Security Officer II

Global Resource Solutions, Inc.

Albuquerque, NM

7 months ago - seen

Security Officer

SCIS - Paragon Systems

Albuquerque, NM

7 months ago - seen

Information Systems Security Officer

Cyber Defense Technologies

Las Cruces, NM

7 months ago - seen

Information Systems Security Officer Level 2

SYSTEM HIGH CORPORATION

Las Cruces, NM

7 months ago - seen

Information Systems Security Officer 2

SPECTRA TECH INC

Los Alamos, NM

7 months ago - seen

Information Systems Security Officer (ISSO)

Gray Tier Technologies

Albuquerque, NM

7 months ago - seen

Information Systems Security Officer (ISSO) Level 2-4

Newport News Nuclear BWXT Los Alamos LLC

Los Alamos, NM

7 months ago - seen

Information Systems Security Officer (ISSO) II

General Dynamics

Albuquerque, NM

7 months ago - seen