What are the responsibilities and job description for the Information System Security Officer position at Knight Federal Solutions?
Description
Knight Federal Solutions is a trusted provider to industry leading prime contractors, the Department of Defense and the Intelligence Community. We have established a company culture that supports our employees, their families and the communities in which they live and work. When you join our team you belong to a group of people that work hard, strive for greatness and care about people.
Our hard work is evident in everything we do. Whether it be supporting large government programs in the areas of Simulation and Training, Information Technology, Intelligence or Engineering we always strive to be the best. It is for this reason that we have been recognized as a World Class Team Supplier by Northrop Grumman and were also named one of Florida’s fastest growing companies by Inc. Magazine.
As Knight Federal Solutions continues to grow, we look forward to hiring the best and the brightest to join us in our success!
Responsibilities
Knight Federal Solutions is a trusted provider to industry leading prime contractors, the Department of Defense and the Intelligence Community. We have established a company culture that supports our employees, their families and the communities in which they live and work. When you join our team you belong to a group of people that work hard, strive for greatness and care about people.
Our hard work is evident in everything we do. Whether it be supporting large government programs in the areas of Simulation and Training, Information Technology, Intelligence or Engineering we always strive to be the best. It is for this reason that we have been recognized as a World Class Team Supplier by Northrop Grumman and were also named one of Florida’s fastest growing companies by Inc. Magazine.
As Knight Federal Solutions continues to grow, we look forward to hiring the best and the brightest to join us in our success!
Responsibilities
- Ability to articulate how much time is needed for taskings assigned and showing up to Sprint planning and SCRUM meetings prepared with adequate work for each sprint
- Submitting Authorization to Operate (ATO) packages for review and approval
- Articulate the time required for assigned tasks and prepare adequately for Sprint planning and SCRUM meetings
- Develop and maintain the System Security Plan (SSP) and manage the Plan of Action and Milestones (POA&M)
- Conduct routine security scans using ACAS and interpret scan results to communicate findings to the Information System Security Manager (ISSM) and relevant stakeholders
- Write and update policies, plans, procedures, and necessary system documentation to support security initiatives
- Provide relevant input on Authorization to Operate (ATO) Body of Evidence (BoE) created by the cybersecurity team, including comments on ISSM-created policies
- Update Security Control Tracking Mechanism (SCTM) control responses to reflect the current network and environment accurately
- Speak confidently about the environmental security posture and control answers when addressing stakeholders or the Authorizing Official (AO) team
- Collaborate with the technical team to understand the implementation of controls, ensuring comprehensive awareness of the security posture—trust but verify
- Communicate security risks and compliance gaps to the ISSM and stakeholders effectively
- Track user onboarding and annual requirements such as Cyber Awareness Challenge and 8570/8140 compliance
- Conduct periodic reviews of information systems to ensure compliance with ATO/IATT
- Coordinate all software and firmware updates and installations with the ISSM
- Demonstrate a thorough understanding of auditing tools such as Splunk and perform regular audits (weekly, monthly, quarterly, and annual) of systems
- Complete Security Impact Assessments (SIAs) and perform SCAP scans as needed
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field
- Proven experience in information system security, compliance, and risk management
- Familiarity with security standards and frameworks (e.g., NIST, ISO)
- Strong analytical skills and attention to detail
- Must hold an active DoD Top Secret Security clearance with SCI eligibility
- Familiarity with AWS or other Cloud providers