Information Systems Security Specialist
Armada Ltd
- Newport, RI
- Permanent
- Full-time
- Conduct compliance checks for SCI accredited automated information systems to validate that they are operated, maintained, and disposed of in accordance with security policies and procedures.
- Compile certificates and security and information systems forms from all special security Information System (IS) users and provide the certificates to the Government POC for final review and validation that the users have the requisite security clearances, authorization, need-to-know, and training to access such ISs.
- On a daily basis, the ISSS shall report all security-related incidents pertaining to the special security information systems to the Command Special Security Information Systems Security Manager (ISSM).
- The ISSS shall conduct periodic reviews of special security information systems to ensure compliance with the security authorization package.
- Upon special security ISSM approval, the ISSS shall participate in and conduct research in support of hardware, software, and firmware reviews as a member of the Configuration Management Boards.
- Submit any requests for changes or modifications to hardware, software, or firmware of a system to the ISSM and AO/DAO, prior to the change, for review and approval.
- Upon notification of a system change that impacts system authorization the ISSS shall notify (e.g. via phone call, e-mail) the ISSM and AO/DAO in accordance with DoDI 8510.01 Risk Management Framework for Information Technology.
- Shall monitor special security IS processes via user testing to ensure security features and procedures are functioning correctly, in accordance with AD 3.59, utilizing GFI 6.56.
- Review all IS security-related documentation to ensure it is current and accessible to authorized individuals.
- ISSS shall review audit records within the special security IS to review for compliance with information policies and to ensure that audit records are being collected. The contractor shall notify the ISSM if the audit records are not being collected or if there are identified compliance issues.
- Fill COMSEC keying materials into COMSEC equipment.
- Sign as a witness for issuing COMSEC materials.
- Perform software or firmware updates on COMSEC equipment.
- All other duties as assigned.
- Demonstrated knowledge, experience, and proficiency in working with CNSI to include Sensitive Compartmented Information (SCI).
- Demonstrated knowledge, experience, and proficiency utilizing Information Systems CNSI, CNSI and SCI policies, CNSI and SCI instructions, CNSI and SCI regulations, and CNSI and SCI procedures.
- Must possess an IAM Level I certificate in accordance with DODM 8140.01.
- Must be familiar with and experienced with DoDI 8510.01 Risk Management Framework for Information Technology (IT).
- IAM Level I certificate in accordance with DODM 8140.01.
- Five (5) years practical experience in Cybersecurity, Engineering, T&E or A&A related field
- OR Seven (7) years' experience without a degree
- Familiarity and experience in DoDI 8510.01 Risk Management Framework for Information Technology (IT).
- Must have the experience, education, or training that demonstrates the ability to follow directions, to read, understand, and retain a variety of instructions, regulations, and procedures.
- Must demonstrate the ability or have endorsements that indicate the ability to learn and perform the cited position's duties.
- Must demonstrate knowledge of security classification methods, concepts, eligibility for access to classified or sensitive information and the process for granting personnel security clearances/accesses, and knowledge of commonly applied security principles, concepts, and methodologies in carrying out information, personnel, and physical security programs related to the protection of SCI.
- Knowledge of the methods of performing such duties as conducting inspections and investigations, collecting, and analyzing information, etc., and skill in weighing the impact of variables such as critical personnel qualifications, variations in building construction characteristics, access and entry restrictions, equipment availability, and other issues that influence the course of actions taken in resolving security questions and issues.
- Bachelor's degree in Cybersecurity technical discipline