[Close] 

ISSO

Jacobs National Security Solutions (NSS) provides world-class IT network and service management capabilities; cutting edge cyber threat awareness and cybersecurity solutions; innovative web- and software applications development; and advanced data analytics for major clients in the Intelligence Community, Department of Defense, and Federal Civilian Agencies.
We deliver an integrated approach to IT network engineering design and network management, as well as full lifecycle IT service management, IT service delivery, asset management, logistics and procurement support, and software/hardware vendor management. Our network engineers, controllers, and technicians are trained in multiple disciplines to successfully maintain legacy systems as well as insert the latest technologies for voice, data, and video networks in fast-paced, mission-critical environments. Our cybersecurity experts conduct identity and access management, penetration testing, and vulnerability assessments for our nation's most closely guarded agencies and networks, and our Cyber Security Operations Centers ensure safe, effective network operations for Federal clients. Our software engineers are writing and tailoring code to solve hard problems across Federal Agencies, and our Data Scientists and Analysts are helping thwart illegal acts before they can endanger Americans or our way of life.
We are thriving ? growing by nearly 100% in the last two years ? and need your talent and motivation to help continue propelling us farther, faster.
Jacobs is seeking an ISSO in Washington D.C. Duties will include:
Assessing and responding to security-related requests
Maintaining operational security posture for information systems
Familiarity with information system security principles
Create Cyber Security artifacts and formulate RMF packages for systems.
Review and analyze system implementation plans.
Ensure that IT systems have all cyber security controls in place and that the all controls function properly in accordance with the latest NIST standards
Formulate and execute system assessments, audits, reviews, and contingency testing.
Review, analyze, and interpret technical procedures and regulatory requirements.
Write reports, business correspondence, and procedure manuals.
Identify corrective actions/mitigation strategies to achieve/sustain RMF compliance.
Perform development of responses to Plans of Action & Milestones (POA&M) which account for confidentiality, integrity, and availability
Active Top Secret security clearance with SCI eligibility
Bachelor of Science degree in Information Technology, IT Security, Network Systems Technology or related field or 4 years' experience in lieu of degree plus eight (8) to twelve (12) years of directly related experience or any equivalent combination of education, experience, training and certifications.
Experience with DHS Information Security, i.e. identifying, documenting, and testing controls
Preferred Qualifications:
Perform selection, implementation, validation, and establishment of baseline of NIST800-53/CNSSI-1253
Experience with information assurance tools.
CISSP or CISA
Experience with vulnerability assessment scanning tools and reporting, such as NESSUS, etc.
Experience using Governance/Risk/Compliance (GRC) tools such as Xacta, CSAM, RSA Archer, etc.
Essential Functions
Physical Requirements:
Most work will be done at a desk or computer.
Work Environment:
General Office environment. The work environment is fast-paced and sometimes involves extreme deadline pressures. The nature of the work requires a high degree of teamwork and cooperation with other members of the staff as well as individuals across the Company and Customers.
Equipment & Machines:
General office equipment including PC/laptop, Fax, Copiers, Shredder, Printers, Telephone, and other miscellaneous office equipment.
Attendance:
Attendance is critical at all times. Must be able to work a 40-hour workweek, normally Monday through Friday. However, times and days may vary depending on business requirements. Needs to be available to work overtime during critical peaks and be available to meet last minute requests for overtime should the situation occur.
Other Essential Functions:
Must be able to communicate effectively both verbally and in writing. Grooming and dress must be appropriate for the position and must not impose a safety risk/hazard to the employee or others. Must put forward a professional behavior that enhances productivity and promotes teamwork and cooperation. Must be able to interface with individuals at all levels of the organization both verbally and in writing. Must be well-organized with the ability to coordinate and prioritize multiple tasks simultaneously. Must work well under pressure to meet deadline requirements. Must be willing to travel as needed. Must take and pass a drug test and background check as well as a motor vehicle records check. Must be a US citizen.
#cjpost
#LI-CC2



Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

ISSO Analyst
Becket, MA Jacobs Engineering
Sr. ISSO Analyst
Becket, MA Jacobs Engineering
ISSO Analyst
Becket, MA Jacobs Engineering