-
Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
-
Assist with preparation and maintenance of documentation
-
Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
-
Assist with Configuration Management (CM) for information system security software, hardware, and firmware
-
Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
-
Propose, coordinate, and implement information systems security policies, standards, and methodologies
-
Develop and maintain documentation for Security Authorization in accordance with ODNI and DoD policies
-
Provide CM for security-relevant information system software, hardware, and firmware
-
Ensure compliance with system security policy
-
Evaluate security solutions to ensure they meet security requirements for processing classified information
-
Maintain operational security posture for an information system or program
-
Provide support to the Information System Security Manager (ISSM) for maintaining the
-
appropriate operational Cybersecurity posture for a system, program, or enclave
-
Develop and update the system security plan and other Cybersecurity documentation
-
Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
-
Track and ensure appropriate user identification and authentication mechanism of the Information System (IS)
-
Obtain system authorization for ISs under their purview
-
Provide support for a program, organization, system, or enclave’s information assurance program
-
Plan and coordinate implementation of IT security programs and policies
-
Manage and control changes to the system assessing the security impact of those changes
-
Provide daily oversight and direction to contractor ISSOs
-
Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives