What are the responsibilities and job description for the Information System Security Officer position at University of Dayton?
Position Summary :
Secure Your Future with the University of Dayton Research Institute! The University of Dayton's Research Institute (UDRI) is seeking a highly motivated and experienced Information System Security Officer to join our dynamic Sensor & Software Systems division in Warner Robins, GA. This is an exceptional opportunity to be part of a renowned research institution committed to excellence, innovation, and community engagement.
The Information System Security Officer (ISSO) position is supporting the Air Force Rapid Sustainment Office (RSO). The RSO increases mission readiness by rapidly identifying, applying and scaling technology essential to the operation and sustainment of the U.S. Air Force. Success comes from our teamwork and mutual respect for each other’s talents and unique perspectives.
This role supports the government cyber lead and provides cybersecurity support for advanced software-intensive technologies to include agile manufacturing, conditioned-based maintenance, augmented reality / virtual reality, cloud-based infrastructure and services, and robotics.
Responsibilities :
- Serve as cybersecurity technical advisor, consultant, and primary point of contact to the Program Manager, Information System Owner, and other stakeholders for the Information systems
- Assessing systems for vulnerabilities and providing corrective recommendations.
- Supporting government Cyber lead in performing RMF activities leading to system RMF acceptance IAW DoDI 8510.01, NIST 800-series special publications, USAF policy and instructions, and guidance as applicable on RSO IT systems in networked, standalone, and cloud configurations.
- Support, coordinate, and continuously monitor system security posture and ensure adverse events are formally handled and reported
- Developing, reviewing, and updating necessary documentation associated with achieving RMF accreditation of each system.
- Applying currently accepted methods for documenting the RMF status of each RSO system within the DoD environment.
- Security Technical Implementation Guides (STIGs) for all systems
- Managing projects in compliance with DoD and AF RMF policies including but not limited to the following :
o DoDI 8500.01 – Cybersecurity Risk Management Framework for DoD Information Technology.
o DoD 8570.01 M - Information Assurance Training, Certification, and Workforce Management.
o CNSSI 1253 - Security Categorization and Control Selection for National Security Systems.
o NIST 800-series Special Publications (SP).
o Computer Security, including SP 800-53 - Security Controls and Assessment Procedures for Federal Information Systems and Organizations and Air Force Instruction Series 17.
Cyberspace :
Accomplishing system categorization, security control selection, security control implementation, security control assessment, and security control monitoring, including, but not limited to, accomplishing the RMF steps as outlined in DoDI 8510.01 on a system-by-system basis
Minimum Qualifications :
Preferred Qualifications :
While not everyone may possess all of the preferred qualifications, the ideal candidate will bring many of the following :