Megahands Technologies Inc Information System Security Officer (ISSO) Remote · Full time Company website

Looking for a qualified Information Systems Security Officer (ISSO) or Cybersecurity SME to join our organization. The candidate will have experience developing and implementing security measures to protect government agency computer systems, networks, and digital information.

Description

HYBRID POSITION


As an Information System Security Officer (ISSO) at Megahands, you will be responsible for:


  • Working with the application leads, sysadmins, dbas, developers and testers to ensure the assigned systems are security compliant and achieve/maintain ATO.
  • This includes following the RMF process for full test, partial test, CONMON and no test.
  • Updating Xacta documentation including SSPs, SCTM, STPs and POAMs.
  • Loading artifacts such as STIG checklists and ACAS scans.
  • Helping to implement STIG checklists and mitigate scan findings.
  • Answering questions to ensure systems are developed with security compliance built in.
  • Supporting security assessment events and responding to all questions from PAT team, ISSMs and SCAs


Experience and Qualifications:

To be eligible for this demanding position, the ideal candidate should demonstrate the following experience and qualifications:

Required Education and Years of Experience:


  • Bachelor's degree in computer science, software engineering or field applicable to the position required.
  • 10 or more years of relevant experience required with a Bachelor’s. Additional experience may be considered in lieu of degree.


Required Qualifications:


  • Active TS/SCI with Poly
  • Full time work in a SCIF is required, but hours are flexible
  • Security+ or other IAT II/III level certification that is currently active
  • Demonstrated experience in developing, implementing, and enforcing security policies, standards, and procedures to ensure regulatory compliance and protect organizational information assets.
  • Proven track record in conducting risk assessments and identifying vulnerabilities in systems, networks, and applications.
  • Experience in developing and overseeing implementation of mitigation strategies to reduce security risks.
  • Strong background in monitoring systems and networks for security breaches and suspicious activity.
  • Successful history of responding to security incidents, investigating root causes, and implementing corrective actions.