CACI Enterprise IT Operations has an opportunity for an Information Systems Security Officer (ISSO) to support a large and complex IT enterprise program.
DUTIES and RESPONSIBILITIES:
As the Information Systems Security Officer (ISSO) some of your duties are as follows:
-You are responsible for maintaining the appropriate operational security posture for the information systems within the program.
-Conduct information security continuous monitoring for all systems and devices with the program scope.
-Serve as the principal adviser to the Government on all matters, technical and otherwise, involving the security of the information system and you are responsible for day-to-day security operations.
-Provide expert level consultation and technical services on all aspects of Information Security.
-Responsible for providing technical leadership focused on information security architecture.
-Perform security research, analysis, and design for all client computing systems and the network infrastructure.
-Responsible for the prevention, detection, investigation and response with respect to security threats and attacks.
-Facilitate and manage security vulnerability assessments and penetration tests.
-Responsible for managing security alerts, events, and security incidents, including forensic analysis.
-Plan and oversee configuration changes for major security infrastructure platforms.
-Develop, implement, and document formal security programs and policies throughout the organization and monitors compliance to these policies and programs.
-Troubleshoot and resolve technical issues related to remote access services.
-Monitor trends in information technology and security that could have an impact on the security of the organization's products, processes, infrastructure, or customers.
-Represent the program's technical security interests with partners, suppliers, industry associations, and government entities to ensure the bi-directional flow of technical information and best practices in information security.
EDUCATION & EXPERIENCE:
- Typically requires Bachelor's degree in Computer Science, IT Information Security, or a related discipline and 10 to 12 years of experience.
- Expertise in the areas of vulnerability and risk management.
- Working knowledge of IT security assessment and network vulnerability tools.
- Experience with large scale enterprise IT contracts.
- Security Certifications (Security+, Network+, CEH, CISSP, or equivalent)
- Experience working with IT customers within the Department of Defense.
Normal demands associated with an office environment. Ability to work on computer for long periods, and communicate with individuals by telephone, email and face to face. Some travel may be required.