USACares Jobs

Job Information

Teknoluxion Information System Security Officer (ISSO) in Arlington, Virginia

Location: Arlington, VA

Security Clearance: Current TS-SCI

Certification: Must have an active Security + certification, plus be able to obtain a Certified Information Systems Security Professional (CISSP) or similar certification for IAT Level III per 8570 Cyber Workforce Requirements within 6 months of hire date.

teKnoluxion provides the Defense and Intelligence Communities technical experts in the fields of Software & Systems Engineering, Enterprise Operations, and Cloud Services Management & Consulting. Our goal is not to simply support efforts, but to ignite a technology revolution, bridging the growing technology gap between the Government and commercial space.

Are you ready to test your abilities as an Information System Security Officer (ISSO) and team member in a sophisticated enterprise exploitation environment? Would you like to make an immediate and direct impact in your job? Join a dedicated team supporting the IC.

  • Apply and verify data security access controls based Joint Security Implantation Guide (JSIG), privileges, and associated profiles

  • Implement media control procedures and continuously monitor for compliance

  • Implement and verify data security access controls and assign privileges based on need-to-know

  • Investigate all suspected cybersecurity incidents in accordance with Departmental directives and applicable Risk Management Implementation Plans (RMIPs)

  • Apply and maintain required confidentiality controls and processes

  • Implement authenticator generation and verification requirements and processes

  • Execute media sanitization (i.e., clearing, purging, or destroying) and reuse procedures

  • Execute processes and procedures for protecting CUI, SAP, SCI, and PII

  • Responsible for creation and management of Body of Evidence (BOE)

  • Maintain privilege access control logs

  • Assess Continuous Monitoring (CM)

  • Creation and management of Interconnection Security Agreements (ISA)

  • Ensure JISG compliance for Oracle databases

  • Ensure JISG compliance of application within multiple accredited boundaries

  • Track vulnerabilities by creating Plan of Action and Milestones (POA&M)

  • Manage the configuration and documentation contained in the program's instance of Enterprise Mission Assurance Support Services (eMASS)

  • Maintain and manage continuous monitoring of DoD STIG compliance

  • Enforce the continuous monitoring strategy using tools such as Splunk, Oracle Cloud Control, ACAS reports, scripts to perform database/application user/privilege review, etc.

  • Advise on secure implementation strategies for database and application projects to include as DBMS and application upgrades

  • Code Reviews for database and application development and configuration management activities, established by the Change Management Plan and Change Management Working Group

  • Demonstrate a general knowledge of project management as it applies to SLAs, POA&Ms, contracts, security administration, and control testing

  • Demonstrate a detailed ability to analyze events or test results and prepare a POA&M

  • Demonstrate the ability to integrate project management, configuration management, continuous monitoring, and POA&M processes

  • Demonstrate a detailed ability to prepare reports identifying the results of compliance and performance tests

  • Determines enterprise information assurance and security standards

  • Develops and implements information assurance/security standards and procedures

  • Coordinates, develops, and evaluates security programs for the organization. Recommends information assurance/security solutions to support customers' requirements

  • Identifies, reports, and resolves security violations

  • Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands

  • Supports customers at the highest levels in the development and implementation of doctrine and policies

  • Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures

  • Performs analysis, design, and development of security features for system architectures

  • Analyzes and defines security requirements for computer systems which may include workstations and personal computers

  • Designs, develops, engineers, and implements solutions that meet security requirements

  • Provides integration and implementation of the computer system security solution

  • Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems

  • Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle

  • Ensures that all information systems are functional and secure

  • Information System Security Officer (ISSO) must interface with Database Administrators (DBAs), Application Administrators (AA), third-party system administrators, Program Management Office, Leadership, Corporate staff and other Cyber Security teams, and the end-user community

What skills do you need?

  • Bachelor's degree from an accredited university in a related field (computer science, engineering, or information systems)

  • 8+ years of experience to include Information Assurance (IA) experience with a large, complex programs

  • The ISSO shall have at least five years' experience in planning, documenting, and resolving security and information assurance issues on a technical program.

  • The ISSO shall have experience leading the overall role of relevant System Engineering and Integration efforts on a technical program

  • Splunk Enterprise – creating and monitoring dashboards, reports, alerts on audit and log data.

  • Candidates MUST have a Security + certification, plus be able to obtain a Certified Information Systems Security Professional (CISSP) or similar certification for IAT Level III per 8570 Cyber Workforce Requirements within 6 months of hire date.

What is ideal?

  • Experience with one or more of the following technologies: Oracle E-Business Suite, Oracle Business Intelligence, Prism, Documentum, Data Warehouse, Cold Fusion, Apache, and Oracle DBMS (Database Management System)

  • Working experience with eMASS is desired

  • Demonstrated ability to build trusted advisor relationships with clients

  • Experience supporting sales and business development

  • Experience with financial management

  • Recognizing great achievements do not go unnoticed by teKnoluxion through service anniversaries, spot awards, and employee referral bonuses

  • You’ll join a growing organization of passionate, top-shelf, IT engineering professionals with extensive experience in actively developing the technology revolution in the Intelligence community

  • Highly competitive benefits package that reflects our objective of employing top industry performers

teKnoluxion is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, sexual orientation or any other characteristic protected by law.

Job ID: 2021-1307

External Company Name: teKnoluxion Consulting, LLC

External Company URL: