View Our Website View All Jobs

Information Systems Security Officer II (ISSO II)

Thank you for your interest in joining the Centauri team. Our company has always represented both performance and innovation. We have combined the forces of three of the most advanced organizations in the national security sector – Integrity Applications Incorporated, Xebec, and DGS.  Together, we can leverage the next generation of advanced technologies to deliver industry-leading capabilities across space, cyber, defense and intelligence.   Our goal is to deliver solutions to address the most difficult technical challenges facing our customers. Of course, the only way that we can tackle those challenges is by recruiting the brightest minds in the industry to join our incredible team.

Job Summary

Seeking a mid-level Information Systems Security Officer II (ISSO II)  to provide advice and assistance to the Government regarding secure configuration and operation of the client’s IT assets. 

Description/Responsibilities:

The typical responsibilities include but are not limit to the following:

  • Conduct risk management framework (RMF) assessment and authorization activities of current and future systems
  • Mitigate and eradicate malicious activity
  • Apply knowledge and experience with standard information systems security concepts, practices, and procedures.
  • Implement common information systems security practices, policies and technologies
  • Demonstrate self-motivation, initiative, sound judgement, and effective communication skills
  • Prepare reports on the status of security safeguards applied to computer systems
  • Gather pertinent security documentation and artifacts for inclusion into system authorization packages.

Required Qualifications:

  • At least three years of relevant information technology security, information systems security, information assurance engineering experience
  • Must possess and maintain or obtain one of the following certifications within six months from their arrival date:
    • CCNA Security
    • CySA+**
    • GICSP
    • GSEC
    • Security+ CE
  • Professional experience with conducting research and analysis
  • Professional experience with controlling, labeling, virus scanning, and appropriately transferring data (uploading/downloading) between information systems at varying classification levels
  • Excellent communication, interpersonal, and team-building skills to engender rapport with the military, civilians, and other contractors at all levels
  • Working knowledge of system functions, security policies, technical security safeguards, and operational security measures
  • Understanding of systems methodologies including but not limited to client server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, LAN, switches, and routers
  • Familiarity with detecting and preventing computer security compromises in a networked environment
  • Working knowledge of configuration management, system maintenance, and integration testing
  • Proficient in the use of tools used to prevent and/or negate malicious code
  • Understanding of COTS tools that scan at the physical layer of all removable and fixed media types including but not limited to: (CDs, hard drives, thumb drives, Zip/Jazz, etc.)
  • Ability to decipher and explain in clear language Intelligence Community Directive (ICD) 503
  • Ability to apply a risk management philosophy when faced with security challenges and the ability to articulate the pro’s and con’s in a clear concise manner
  • Demonstrated proficiency with database maintenance
  • Strong ability to elicit, articulate, and document information in a well-organized manner
  • Demonstrated ability to work independently of closer supervision
  • Demonstrated experience with Microsoft Office Suite
  • Working knowledge of all applicable client policies, procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM)
  • Ability to prioritize work to meet deadlines, and to manage the workflow of the ISSO team
  • Demonstrated ability to correlate audit results between various systems and/or users and notify the ISSM of any discrepancies

Desired Qualifications:

  • Bachelor’s degree in information technology security or related field
  • More than one of the following certifications:
    • CCNA Security
    • CySA+**
    • GICSP
    • GSEC
    • Security+ CE

Security Clearance Requirements:

TS/SCI CI poly

Read More

Apply for this position

Required*
Apply with
Attach resume as .pdf, .doc, .docx, .odt, .txt, or .rtf (limit 5MB) or Paste resume

Paste your resume here or Attach resume file

To comply with government Equal Employment Opportunity / Affirmative Action reporting regulations, we are requesting (but NOT requiring) that you enter this personal data. This information will not be used in connection with any employment decisions, and will be used solely as permitted by state and federal law. Your voluntary cooperation would be appreciated. Learn more.
Gender
Race/Ethnicity

Invitation for Job Applicants to Self-Identify as a U.S. Veteran
  • A “disabled veteran” is one of the following:
    • a veteran of the U.S. military, ground, naval or air service who is entitled to compensation (or who but for the receipt of military retired pay would be entitled to compensation) under laws administered by the Secretary of Veterans Affairs; or
    • a person who was discharged or released from active duty because of a service-connected disability.
  • A “recently separated veteran” means any veteran during the three-year period beginning on the date of such veteran's discharge or release from active duty in the U.S. military, ground, naval, or air service.
  • An “active duty wartime or campaign badge veteran” means a veteran who served on active duty in the U.S. military, ground, naval or air service during a war, or in a campaign or expedition for which a campaign badge has been authorized under the laws administered by the Department of Defense.
  • An “Armed forces service medal veteran” means a veteran who, while serving on active duty in the U.S. military, ground, naval or air service, participated in a United States military operation for which an Armed Forces service medal was awarded pursuant to Executive Order 12985.
Veteran status
I IDENTIFY AS ONE OR MORE OF THE CLASSIFICATIONS OF PROTECTED VETERAN LISTED ABOVE
I AM NOT A PROTECTED VETERAN
I DON’T WISH TO ANSWER

Voluntary Self-Identification of Disability
Voluntary Self-Identification of Disability Form CC-305
OMB Control Number 1250-0005
Expires 1/31/2020
Why are you being asked to complete this form?

Because we do business with the government, we must reach out to, hire, and provide equal opportunity to qualified people with disabilities.i To help us measure how well we are doing, we are asking you to tell us if you have a disability or if you ever had a disability. Completing this form is voluntary, but we hope that you will choose to fill it out. If you are applying for a job, any answer you give will be kept private and will not be used against you in any way.

If you already work for us, your answer will not be used against you in any way. Because a person may become disabled at any time, we are required to ask all of our employees to update their information every five years. You may voluntarily self-identify as having a disability on this form without fear of any punishment because you did not identify as having a disability earlier.

How do I know if I have a disability?

You are considered to have a disability if you have a physical or mental impairment or medical condition that substantially limits a major life activity, or if you have a history or record of such an impairment or medical condition.

Disabilities include, but are not limited to:

  • Blindness
  • Deafness
  • Cancer
  • Diabetes
  • Epilepsy
  • Autism
  • Cerebral palsy
  • HIV/AIDS
  • Schizophrenia
  • Muscular dystrophy
  • Bipolar disorder
  • Major depression
  • Multiple sclerosis (MS)
  • Missing limbs or partially missing limbs
  • Post-traumatic stress disorder (PTSD)
  • Obsessive compulsive disorder
  • Impairments requiring the use of a wheelchair
  • Intellectual disability (previously called mental retardation)
Please check one of the boxes below:

You must enter your name and date
Your Name Today's Date
Reasonable Accommodation Notice

Federal law requires employers to provide reasonable accommodation to qualified individuals with disabilities. Please tell us if you require a reasonable accommodation to apply for a job or to perform your job. Examples of reasonable accommodation include making a change to the application process or work procedures, providing documents in an alternate format, using a sign language interpreter, or using specialized equipment.


iSection 503 of the Rehabilitation Act of 1973, as amended. For more information about this form or the equal employment obligations of Federal contractors, visit the U.S. Department of Labor's Office of Federal Contract Compliance Programs (OFCCP) website at www.dol.gov/ofccp.


PUBLIC BURDEN STATEMENT: According to the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless such collection displays a valid OMB control number. This survey should take about 5 minutes to complete.

Human Check*