CACI is seeking an Information Systems Security Officer (ISSO) to lead the configuration management activities for the development and sustainment tasking associated with Joint Operational Medicine Information System (JOMIS) Application Transition Support (JATS) program. JATS is a mission-critical component of the DoD’s new GENESIS EHR implementation that will integrate or transition ancillary systems from the current TMIP-J solution to enable GENESIS deployment into theater operations. Additionally, JATS will sustain the current theater TMIP-J software components deployed to theater medical forces supporting all medical functional areas, including command and control, medical logistics, blood management, patient regulation and evacuation, medical threat/intelligence, health care delivery, manpower and training, and medical capability assessment and sustainment analysis. The ISSO will help ensure the JATS Program is successful in providing an integrated medical information system to support theater operations by linking all levels of medical care in support of time-sensitive decisions critical to the success of theater operations. Ultimately, the ISSO is responsible for information assurance planning and implementation on all software releases from the JATS program, as well as for cybersecurity of all pre-production JATS environments. The ISSO manages and monitors the cybersecurity processes so that only approved access is possible to the JATS environments and software applications within JATS scope. Overall responsibility of the ISSO is to ensure that all hardware, software, components and interfaces associated with the project are under rigorous cybersecurity control, while delivering a robust, stable and compliant JATS solution fulfilling customer requirements and achieving a high degree of customer satisfaction.
CACI’s Health Solutions Group serves the U.S. by accelerating the transformation of Federal healthcare through the application of new strategies, technology and processes. Our solutions offer high benefit, low risk implementation and support for critical missions, including healthcare delivery systems, public health, medical logistics, and benefits and entitlement services. We provide functional and technical subject matter expertise and health IT services to defense and civilian healthcare agencies. Our solutions comprise software development, systems integration, information sharing, analytics and information assurance, as well as knowledge management and business process re-engineering. By focusing on patients, providers and payers, we ensure that systems and processes in healthcare agencies are optimally productive and efficient.
Maintain the appropriate operational security posture for the information systems within the program.
Provide technical leadership focused on information security architecture.
Provide expert level consultation and technical services on all aspects of Information Security.
Serve as the principal adviser to the Government on all matters, technical and otherwise, involving the security of the information system and you are responsible for day-to-day security operations.
Represent the program's technical security interests with partners, suppliers, industry associations, and government entities to ensure the bi-directional flow of technical information and best practices in information security.
Perform security research, analysis, and design for all client computing systems and the network infrastructure.
Conduct information security continuous monitoring for all systems and devices with the program scope.
Prevent, detect, investigate and respond to security threats and attacks.
Facilitate and manage security vulnerability assessments and penetration tests.
Manage the Information Security team for the program, including all aspects of personnel management for employees assigned.
Manage security alerts, events, and security incidents, including forensic analysis.
Plan and oversee configuration changes for major security infrastructure platforms.
Develop, implement, and document formal security programs and policies throughout the organization and monitors compliance to these policies and programs.
Troubleshoot and resolve technical issues related to remote access services.
Monitor trends in information technology and security that could have an impact on the security of the organization's products, processes, infrastructure, or customers.
Minimum of three (3) years of experience in Cybersecurity management, either with DIACAP, RMF, or a combination of both, required
Expertise in the areas of vulnerability and risk management, required
Working knowledge of IT security assessment and network vulnerability tools, preferred
Experience working with large scale enterprise IT environments, required
Experience working with large software development teams to develop and maintain cybersecurity baselines in multiple environments (development, test, production, etc.) supporting complex systems incorporating project engineering development and development operations (DevOps) support models, preferred
Demonstrate a commitment to excellence and a dedication to producing quality work results, be committed to customer service, well organized, able to plan and prioritize assignments, and able to successfully handle multiple tasks simultaneously, required
Ability to work with minimal supervision to achieve program objectives and deadlines, required
Experience working in Military Healthcare System (MHS) environment, preferred
Background knowledge of TMIP-J and associated legacy systems, preferred
Background knowledge of DHMSM and associated legacy and future DoD health systems, preferred
Bachelor’s Degree in computer science, engineering or cybersecurity, preferred
Appropriate security certifications for this management position (CISSP, CISA, CRISC, etc. ), required
Have or be able to obtain a Top Secret/SCI security clearance as defined in the security classification guide, required
Excellent organizational and communication skills, required
Ability to communicate effectively both verbally and in writing, be courteous and professional when interacting with colleagues and customers, required
Demonstrate a solid ability to identify and solve problems, and be able to work successfully in a team environment, required