Information Systems Security Officer (ISSO)


Job Details

DANASTAR is currently seeking talented, experienced Information System Security Officers (ISSO) for an exciting position supporting one of our premier clients. Our project is aimed at establishing cutting-edge techniques for network defense, identifying threats and detecting malicious activity using advanced toolsets.


The ideal candidate will have hands-on experience with the safeguarding of Federal government IT environments. In addition, the candidate should be able to Lead and coordinate assessment and authorization, continuous monitoring, and risk management activities to ensure the security posture of client IT systems. The candidate should be able to work independently and in a group environment. The candidate will develop and maintain policies, standards, procedures to ensure compliance while working closely with client system owners, designated information system security officers, and other system stakeholders. Additionally, the candidate should be able to apply their understanding of FISMA, OMB regulations, and NIST standards and informs client leadership of cybersecurity best practices.


The candidate should be able to lead cross-functional cybersecurity projects to successful completion using project management approaches; as well as provide leadership and guidance in the creation, management, and closure of Plan of Action and Milestones to assure remediation of control implementation findings and mitigation of risks. The candidate will need to work collaboratively with internal client stakeholders by facilitating the assessment of systems and developing reports for client leadership. The candidate will need to be able to lead a team of security analysts in conducting security impact assessments for client change requests and informs the Change Control Board of identified risks. Also, the candidate will manage the client s A&A document repository and assure IT system security documents are current and compliant

The ideal candidate will have experience with Continuous Monitoring, Continuous Authorization, and FedRAMP assessments and will keep up-to-date on emerging trends in the cyber security field.


Required Qualifications:

  • An industry certification such as CASP, CAP, CISSP, CISM, GSEC, GMON, Security+
  • 4 years of experience in Information Assurance
  • Bachelor s Degree in Computer Science, Computer Engineering, Information Systems or equivalent experience.


Job Duties:


  • Support of each step within the RMF lifecycle while using CSAM, with direct hands-on experience planning, creating artifacts, tailoring security controls, and verifying security control recommendations were implemented for on-prem and cloud-based capabilities
  • Hands-on experience using Nessus, Qualys, Vulnerator, and STIG Viewer in support of the A&A and continuous monitoring processes.
  • Hands-on experience implementing recommendations from STIGs, developing STIG checklists, and using tools, such as STIG Viewer, Nessus, and/or Vulnerator to verify and track results
  • Hands-on experience obtaining relevant STIGs, NSA, and NIST recommendations, along with CIS benchmarks and/or vendor best practices for securing networking devices, workstations, and/or servers, and application security
  • Hands-on experience creating, managing, and updating required artifacts for an A&A package
  • Must be able to communicate effectively in the English language, absorb constructive criticism, and not be combative if a system owner doesn't understand what you're asking for related to the A&A process, as well as be able to track communication efforts, coordinate meetings, capture talking points, and lead the discussions related to the A&A process
  • Candidates may be asked to demonstrate through a video call the process of using tools such as the STIG Viewer or Vulnerator, associated NIST / RMF websites, etc..

  • Assess the information system based on agency policies and provide recommended corrective actions to reduce risk associated with the system deficiencies and deviations from industry standards.
  • Collaborate with system personnel on identified deficiencies, complete the Security Assessment Report (SAR), and provide security authorization recommendations to the Certifying Official or AO.
  • Ensure FISMA systems are assessed and accredited to receive an Authority to Operate (ATO).
  • Monitor and execute the operations and maintenance of an information system and dispose of system and data according to the approved security authorization process
  • Serve as a member of the Architecture Review Board (ARB) and ensure system security requirements are addressed during the system lifecycle.
  • Establish audit trails, ensure their regular review, and make audit logs available upon request.
  • Develop and maintain the system security plan (SSP), security assessment plan/report (SAP/SAR), POA&Ms, security control assessment, and authorization memorandums in CSAM.
  • Conduct various security controls assessments (automated and manual) at different frequencies specific to a system and based on an established core control assessment schedule and provide results to include control gaps or weaknesses, risk level, cost- benefit analysis, and impact.
  • Support the development of the systems Privacy Impact Assessments (PIA), interconnection security agreements, incident response plan, contingency plan, risk assessments, configuration management plan, security impact assessments, standard operating procedures, and guides as necessary.
  • Review and analyze all system artifacts for accuracy and completeness in support of authorization to operate (ATO) requests.
  • Create or review ATO packages prior to submission to the Authorizing Official.
  • Ensure all assessment and audit reports are uploaded properly in CSAM.
  • Conduct reviews of closed POA&Ms for completeness and compliance.
  • Develop and support the OA process that includes continuous monitoring activities using client s GRC tools.
  • Draft document, review and provide feedback on application of security requirements.
  • Contribute to configuration management process development.
  • Execute activities within the information system contingency planning process; provide technical advice and guidance in business continuity/COOP program development, conduct vulnerability and risk analysis, provide support to ensure business processing, recovery criticality and resources requirements are identified and aligned with information system resources and recovery priorities to support the continued operation of the mission





 Danastar Professional Services, LLC

 05/10/2024

 Washington,DC