SUMMARY :
An Information Systems (IS) Security Officer (ISSO) is an individual responsible for ensuring the appropriate technical and operational security posture is maintained specified installed and supported on all Company-owned computer
systems as required. The ISSO ensures that the companys information systems comply with regulations and customer requirements by performing duties as defined in DoD 5220.22-M (NISPOM) DAAPM NIST-SP 800-53 NIST-SP 800-37 NIST SP 800-171 CMMC and other requirements. The ISSO is also responsible for planning and responding to service outages and other issues.
The ISSO is responsible for managing the A-10 TSSC IS administration and assisting managing the A-10 TSSC IS administration in conjunction with the company Information Systems Security Manager (ISSM) and team. This is a hands-on position that includes analysis of requirements proposing solutions managing and participating in project implementations and on-going support of the IS infrastructure. The objective of this position is to meet program requirements while continually improving operating efficiencies by enhancing the IS process.
Additionally the Information Technology (IT) Manager is responsible for overseeing the planning implementation and maintenance of all technology systems within the Training Systems Support Center (TSSC). This role ensures that TSSC IT operations run securely efficiently and in alignment with company objectives. The IT Manager manages vendors and provides strategic guidance on technology investments and digital transformation initiatives.
ESSENTIAL DUTIES AND RESPONSIBILITIES :
Perform general administration and conduct routine audits of systems and software and maintain records documenting purchase / acquisition / disposal of all IS related inventory in accordance with security policies and procedures.
Own RMF lifecycle execution for all accredited systems including artifacts POA&M management and continuous monitoring activities.
Lead cybersecurity compliance efforts for ATO renewals and ongoing sustainment.
Oversee implementation of NIST 800-53 security controls and ensure evidence collection for audits.
Perform regular backups ensure integrity of backup systems & media and retain backups for all systems in accordance with approved policies and procedures.
Support simulator hardware / software baselines build management and change management reviews.
Ensure that proper decisions are made concerning risk levels for the systems and areas of concern for confidentiality integrity and availability of the data.
Participate in risk assessment procedures for verification of Assessment and Accreditation RMF safeguards.
Apply updates patches and configuration changes to IS equipment.
Add remove and update user account information and ensure all proper account management documentation is completed prior to adding / deleting IS accounts.
Verifying all IS security-related and system related documentation is current and accessible to properly authorized individuals Ensure software hardware and firmware complies with appropriate security configuration guidelines (e.g. Security Technical Implementation Guides (STIGs) / Security Requirement Guides (SRG)).
Initiate protective or corrective measures in coordination with the security manager when a security incident or vulnerability is discovered.
Report security incidents or vulnerabilities to the ISSM
Initiate exceptions deviations or waivers to cybersecurity requirements.
Conduct periodic assessments of authorized ISs and provide corrective actions for all identified findings and vulnerabilities to the ISSM.
Conduct vulnerability assessments of the information systems using ACAS and generate assessment reports.
Respond to technical and security inquiries.
Applies various analysis tools and techniques to identify develop procure implement and support IS solutions that increase quality productivity and overall effectiveness of the Company departments.
Complete required technical and security training relative to assigned duties.
Specifies system requirements for information systems for improvements.
Keeps system users informed of progress and updates.
Works with Information System Technology and Security Department to ensure appropriate security protections are in place to protect against malicious external penetrations and / or data loss.
Act as a backup for ISSM-related tasks on all accredited systems. This includes documentation updates user security briefings and auditing.
Verifying the implementation of delegated aspects of the IS security program.
Adheres to company and client department policies on information security and risk management.
Coordinates the inclusion of other staff and technical resources as necessary.
Attends necessary weekly monthly and quarterly meetings as required or directed.
Perform other tasks assigned by supervisor.
QUALIFICATION REQUIREMENTS :
To perform this job successfully an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge skill and / or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
EDUCATION and / or EXPERIENCE :
Bachelors Degree (B.S.) in related field and at least 5 years related experience and / or training. Experience or working knowledge of vulnerability scanning procedures. Experience with ACAS eMASS STIGs CIS Benchmarks SCAP Compliance Checker (SCC) McAfee ePO and other related security compliance solutions to oversee the implementation and enforcement of security policies. Experience preparing documentation required to obtain an Authorization to Operate (ATO) following assessment and authorization in an RMF environment.
CERTIFICATION :
Must meet DoD 8140 / 8570 IAM-I requirements within 6 months of hire date :
GSEC
Security
SSCP
LANGUAGE SKILLS :
Ability to read analyze and interpret common professional literature. Ability to respond to common inquiries or complaints from customers regulatory agencies or members of the business community. Ability to effectively present information to management and colleagues.
MATHEMATICAL SKILLS :
Ability to comprehend and apply basic mathematical skills.
COMPUTER SKILLS :
Experience with implementation configuration and management of Microsoft Windows and Linux operating systems. Experience with implementing and troubleshooting computer networks. Technology skills including proficiency with Microsoft Office applications are essential. Experienced and proficient in the use of standard personal computer software tools; including word processors spreadsheets presentation graphics and databases.
REASONING ABILITY :
Ability to define problems collect data establish facts and draw valid conclusions.
CITIZENSHIP :
U.S. Citizenship. Must be able to obtain a Secret Level Clearance
OTHER SKILLS and ABILITIES :
Experienced and proficient in the u se of standard Personal Computer productivity software tools including word processors spreadsheets presentation graphics project management and databases.
PHYSICAL DEMANDS :
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job the employee is regularly required to sit; use hands to finger handle or feel objects tools or controls; reach with hands and arms; and talk or hear. The employee is frequently required to stand; walk; climb or balance; and stoop kneel crouch or crawl.
The employee must regularly lift and / or move up to 10 pounds must frequently lift and / or move up to 25 pounds and must occasionally lift and / or move up to 50 pounds. Specific vision abilities required by this job include close vision color vision depth perception and the ability to adjust focus.
CymSTAR LLC will recruit hire train and promote qualified individuals in all job titles and ensure that all other personnel actions are administered without regard to race color religion sex military and / or veteran status or disability or any other characteristic protected by federal state or local laws in accordance with Section 503 of the Rehabilitation Act of 1973 as amended and the Vietnam Era Veterans Readjustment Assistance Act of 1974 which require affirmative action to ensure equal opportunity in all aspects of employment. CymSTAR LLC does not discriminate on the basis of national origin or citizenship status as provided under the Immigration Reform and Control Act of 1986.
If you are interested in applying for employment and need special assistance or an accommodation to apply for a posted position please contact our Human Resources department via phone at or email at
This policy applies to all employment terms and conditions including recruiting hiring placement promotion termination layoff recall transfer leaves of absence compensation and training.
Required Experience :
Manager
Key Skills
Business Process,SQL,Active Directory,Information Technology,Database,Information Security,Infrastructure,ITIL,Project Management,Internet,ERP,Backup,Setup,hardware,Technical Support
Employment Type : Full-Time
Experience : years
Vacancy : 1
Technology Manager • Tucson, Arizona, USA