Information Security Systems Officer - Accenture Federal Services Herndon, Virginia, United States Bookmark Share Print 202 0 0

Listing Description

You are:


An Information Systems Security Officer (ISSO) will serve as a senior advisor on all matters, technical and otherwise, involving the security of information systems under their purview.  Primary support will be working within Classified Systems up to the TS/SCI level, supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, Defense Counterintelligence and Security Agency, Intelligence Community, & Military Compartment efforts. The position will provide “day-to-day” oversight of Interim Authorizations to Operate (IATOs) and Authorization to Operate (ATOs) through each of the Risk Management Framework steps to include: maintenance, support, creation, and resubmissions.



  • Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing network infrastructures

  • Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on NIST 800-53 Security and Privacy Controls for Information Systems and Organizations, along with the National Industrial Security Program Operating Manual (NISPOM)

  • Advise customer on Risk Management Framework (RMF) assessment and authorization issues

  • Perform risk assessments and make recommendations to DoD agency customers and advise government program managers on security testing methodologies and processes

  • Evaluate authorization documentation and provide written recommendations for authorization to organizational and government PMs

  • Security Control Implementation

  • Develop and maintain a formal Information Systems Security Program

  • Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties

  • Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation

  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media

  • Develop and execute security assessment plans that include verification that the features and assurances required for each protection level are functioning

  • Institute and implement a Configuration Control Board (CCB) process and methodology

  • Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents

  • Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system

  • Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements

  • Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.

  • Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed

  • Assess changes in the system, its environment, and operational needs that could affect the authorization

  • Ensure that authorization is accomplished through a valid Authorization determination for all authorization boundaries under your purview

  • Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)

  • Conduct periodic assessments of the security posture of the authorization boundaries

  • Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware are properly documented

  • Ensure periodic testing is conducted to evaluate the security posture of IS by employing various detection and monitoring tools (shared responsibility with ISSOs); Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination

  • Ability to maintain documentation and artifacts within eMass or similar system for Government client


Here's what you need:



  • Bachelor’s degree in a related area or equivalent experience (4 years)

  • DoD Directive 8570.01-M for Information Assurance Manager Level II with the ability to reach Information Assurance Manager Level III within 6 months of the date of hire.

  • 5+ years related experience in roles such as ISSE, ISSO or ISSM

  • Security Clearance: Active TS


Bonus points if you have:



  • Prior experience supporting Classified Information Systems

  • Prior experience providing direct support to USAF HQ, Office of the Secretary of Defense (OSD) or other  

  • Military Compartmented efforts

  • CISSP, CISM or CASP Certifications

  • Experience with eMASS or XACTA

  • Management experience with at least 1 direct report

  • Clearance currently held with or previous experience with intelligence community


Compensation for roles at Accenture Federal Services varies depending on a wide array of factors including but not limited to the specific office location, role, skill set and level of experience. As required by local law, Accenture Federal Services provides a reasonable range of compensation for roles that may be hired in California, Colorado, New York, or Washington State as set forth below and information on benefits offered is here.   


Role Location: Range of Starting Pay for role:


California: $95,600-$154,300


Colorado: $95,600-$154,300


New York: $88,600-$178,600


Washington State: $101,900-$164,400


Listing Details

  • Citizenship: Not Provided
  • Incentives: Not Provided

 

  • Education: Not Provided
  • Travel: Not Provided
  • Telework: Not Provided



About Us

NinjaJobs is a community-run job platform developed by information security professionals. Our unique approach of focusing strictly on cybersecurity positions allows us to personalize the user experience.

Our Contacts

1765 Greensboro Station Pl.
Suite 900
Tysons Corner Va 22102

(703) 594-7765