Information System Security Officer (Library of Congress)
TISTA Science and Technology Corporation, a CMMI Maturity Level 3 company, focuses on delivering information technology (IT) and professional services to Federal and State agencies. TISTA is an Inc. 500 company, a recipient of the 2010 Top 100 Service-Disabled Veteran-Owned Businesses from Diversity Business, recognized in Washington Technology’s FAST 50 list of the fastest growing small businesses in government contracting in 2012 & 2013, recognized as the Top 25 Fastest Growing Small Technology companies by the Washington Business Journal in 2014 & 2015, and selected as the Veteran Owned Company of the Year in 2014 by the Montgomery County MD Dept. of Economic Development.
The Information Systems Security Officer (ISSO) will provide Security Assessment and Authorization (SA&A) support to the client and their IT systems within the Library’s inventory. These systems are a combination of General Support Systems, Major Applications, Minor Applications and Subsystem at various impact levels.
The ISSO will be responsible for developing and providing risk and vulnerability assessments, Security Control Assessments (SCA), SA&A documentations and various reports, based on NIST guidelines and client’s policies, procedures and request.
- Developing a detailed project schedule, including SA&A/SCA task and milestones, task dependencies, and personnel resources
- Conducting SA&A activities sand tasks and obtain Authorization to Operate (ATO) in line with NIST and client guidance and directives.
- Determining the baseline IT Security requirements for IT Systems, identifying system boundaries, determining information categories, assisting with FIPS-199.
- Ensure that IT Systems are operated, used, maintained, and disposed of in accordance with internal security policies and practices.
- Enforce security policies and safeguards on all personnel having access to the IT System for which the ISSO has responsibility.
- Ensure users and system support personnel have the required authorization and need-to-know; have been indoctrinated; and are familiar with internal security practices before access to the IT System.
- Review and generate SA&A and system documentation as needed.
- Selecting baseline controls for the IT System using RSA Archer and tailor security controls as appropriate.
- Implement security controls based on IT System FIPS categorization.
- Documenting security control implementation in the system’s Security Plan using the Library’s Information Assurance (IA) tool (RSA Archer).
- Conduct SCA for IT systems, when required.
- Document system’s risk assessment per client directives and requirements.
- Develop and document all required artifacts for the SA&A package.
- Conduct Contingency Plan Test (CPT) for systems.
- Review and monitoring system security and audit logs.
- Develop and maintain Plan of Actions and Milestones (POA&Ms) for IT systems.
- Update SA&A documentation and artifacts on a regular basis (e.g. annually, after approved change)
- A minimum of five (5) years of demonstrated experience in the Information Security (Cybersecurity or Information Assurance) field.
- Demonstrates a proficiency with developing, maintaining and managing SA&A packages.
- Experience with developing and managing POA&M’s.
- Displays technical experience with conducting research and providing review recommendations on software and technologies for vulnerabilities.
- Technical experience with reviewing vulnerability scans and providing mitigation techniques.
- Possess expertise in conducting SCA’s.
- Experienced writing security related policies and procedures
- Possess experience conducting CPT’s.
- Experience with conducting audit log reviews.
- Experience with NIST Special Publications and guidance.
- Strong problem solving and analysis skills, self-motivated, and able to work and communicate in a team environment.
- Excellent communication (written and verbal) skills
- Bachelor’s degree or higher in computer science, Information Technology, Information Security, or similar fields.
- A minimum of at least one (1) certification must be active relating to information security such as:
- Certified Information Systems Security Professional (CISSP);
- GIAC security certification (e.g. GCIH, GWAPT, GPEN, GSLC, etc.)
- CompTIA Security +
Clearance: Public Trust
Work Location: Washington, DC