[Close] 

Information Systems Security Officer / Schofield Barracks

Description: CTC\-IS Information System Security Officer \(ISSO\)
While the ISSM has overall responsibility for CTC\-IS, the CTC\-IS ISSO provides technical contributions concerning the overall security to ensure the availability of critical resources and to facilitate overall system security and availability\.
1\) The CTC\-IS ISSO establishes the minimum requirement for system access and manages the Security Training program in accordance with this security plan
2\) Utilizes the Army Training & Certification Tracking System \(ATCTS\) for tracking all authorized user training records prior to authorizing account creation
3\) Executes the user and privileged account creation process as defined in the Account Management Section of the Access Control \(AC\) Section of the SSP
4\) Notifies authorized users prior to their expiration date on their current security awareness, role\-based security, or physical security certifications
5\) Tracks all user and privileged accounts, and permissions, on a personnel spreadsheet, Retains training records for 5 years
6\) Maintains industry certification in accordance with DOD 8570\.01\-M & DODD 8140\.01 for IA Manager \(IAM\) Level I
7\) Is responsible for the security management of the specific CTC\-IS and act as the staff focal point for any specific CTC\-IS security issues as a designee for the ISSM
8\) Ensures all assigned IS workstations are operated, maintained, and secured according to AR 25\-2 and this Security Plan\. Maintains a file copy of the accreditation statement, and prepare specific recommendations to the Site ISSM and MACOM IAPM for input to the accreditation document, as required
9\) Coordinates all changes in the security environment with the Site ISSM, maintains an accurate inventory of all IS hardware and software\. Ensures this inventory is reconciled at least annually
10\) Conducts periodic inspections and reviews to ensure compliance with this Security Plan \(SP\) and other policies pertaining to IS security
11\) Oversees the review of the system audit trail\. Investigates thoroughly any security violations, in coordination with the S\-2/Security Manager\. Ensures CTC\-IS audit trails are reviewed at least weekly and audit files are maintained for one year
12\) Immediately reports any information system security incidents discovered regarding the IS IAW the Specific CTC location?s CTC\-IS Incident Response Plan
13\) Completes an information system security course of instruction appropriate to level of responsibilities or subject area
14\) Registers at the DTIC website at http://www\.dtic\.mil to receive update notifications for DOD 8510\.01 RMF Documentation
15\) Reviews accounts for compliance with account management requirements at least annually, done concurrently with account renewal at expiration assigned during account creation, one year from date of the DOD IA Awareness training\.
16\) Maintains a copy of all access authorizations for a minimum of 5 years
17\) Reviews at a minimum, annually the privileges assigned to all users to validate the need for such privileges
18\) Authorizes the creation, modification, disable or removal of system accounts
19\) Ensures the SOC staff review on a daily basis, the firewall/IPS log data to determine if attacks or inappropriate activity has occurred
20\) Ensures the automated and manual DOD\-approved tools are used to evaluate the system periodically, on a rotational/monthly basis to identify and assess any deltas or deviations from the baseline
21\) Ensures through the Continuous Monitoring program, the CTC\-IS SOC Personnel reviews and updates the list of authorized software programs on a monthly basis
22\) Reviews the contingency plan for the IS annually during the FISMA audit event
23\) Ensures backup information is tested at least monthly in accordance with contingency plan to verify media reliability and information integrity
24\) Maintains an up\-to\-date list of all computer systems authorized to write to removable media, and periodically review the audit trails of those systems
Basic Qualifications:
1\) Previous ISSO experience
2\) Interim Secret Clearance
3\) Experience performing the continuous monitoring of system security controls
4\) Must be able to build and maintain effective team and customer relationships
5\) Possess strong written and verbal communications, interpersonal relations, organizational, troubleshooting and analytical skills
6\) Maintains industry certification in accordance with DOD 8570\.01\-M & DODD 8140\.01 for IA Manager \(IAM\) Level I
Desired Skills:
1\) Ability to work independently without appreciable direction\.
2\) Keen attention to detail and adherence to established security policies
3\) COMSEC Account Management Experience
4\) Warfighter/ATMP experience
BASIC QUALIFICATIONS:
job\.Qualifications
Lockheed Martin is an Equal Opportunity/Affirmative Action Employer\. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status\.
Join us at Lockheed Martin, where your mission is ours\. Our customers tackle the hardest missions\. Those that demand extraordinary amounts of courage, resilience and precision\. They?re dangerous\. Critical\. Sometimes they even provide an opportunity to change the world and save lives\. Those are the missions we care about\.
As a leading technology innovation company, Lockheed Martin?s vast team works with partners around the world to bring proven performance to our customers? toughest challenges\. Lockheed Martin has employees based in many states throughout the U\.S\., and Internationally, with business locations in many nations and territories\.
EXPERIENCE LEVEL:
Experienced Professional


Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.