What are the responsibilities and job description for the Information Systems Security Officer 3 position at WarCollar Industries, LLC?
Job Title : Information Systems Security Officer (ISSO) 3
MUST Possess An Active TS / SCI with Full Scope Poly
Position Overview : We are seeking an experienced and highly motivated Information Systems Security Officer (ISSO) 3 to join our team. In this role, you will manage the information security posture of both classified and unclassified systems, ensuring the protection of sensitive data and compliance with established security frameworks. You will work collaboratively with government stakeholders, technical teams, and subject matter experts (SMEs) to safeguard information, perform risk assessments, and lead security authorization efforts. Your expertise in security best practices, risk management, and system documentation will be pivotal in ensuring the continuous monitoring and defense of our organization’s IT infrastructure.
Key Responsibilities :
- Security Management : Oversee the entire lifecycle of information security for classified and unclassified systems, including research, testing, implementation, training, and program management to protect sensitive information from potential threats and vulnerabilities.
- Risk Management Framework (RMF) : Apply comprehensive knowledge of RMF processes, identifying, assessing, and mitigating risks to IT systems. Lead risk analysis efforts, ensuring effective risk management strategies are implemented across the organization.
- Authorization and Compliance : Lead and support Authority to Operate (ATO) and Authority to Proceed (ATP) efforts. Provide independent recommendations and work directly with government leads to ensure the successful authorization of IT systems.
- Vulnerability and Compliance Analysis : Conduct detailed analysis of vulnerability scans, penetration tests, and other audit activities to identify potential threats. Provide actionable insights and recommendations for system improvements and risk mitigation.
- Documentation & Reporting : Create, review, and maintain key security documentation, including but not limited to System Security Plans (SSPs), Plan of Action and Milestones (POA&Ms), Configuration Management Plans, Contingency Plans, and Risk Assessments. Ensure compliance with security requirements and provide clear, accurate status reports to stakeholders.
- Agile Participation : Actively engage in Agile Planning events, contributing technical insights and providing expert security input to ensure security is integrated throughout the development lifecycle.
- Continuous Monitoring & Security Posture Management : Ensure the security posture of IT systems is maintained across on-prem, cloud, and hybrid environments. Lead continuous monitoring efforts to identify and resolve emerging security risks.
Required Qualifications :
Desired Qualifications :