The candidate will ensure that security requirements for information systems meet FISMA requirements. The candidate will be responsible for:
Developing and updating security authorization packages in accordance with the client’s requirement and compliant with FISMA. Core documents that the candidate will be responsible for are the System Security Plan, Risk Assessment Report, Security Assessment Plan and Report, Contingency Plan, Incident Response Plan, Standard Operating Procedures, Plan of Actions and Milestones, Remediation Plans, Configuration Management Plan, etc.
Develop and maintain the Plan of Action and Milestones and support remediation activities.
Validate that protective measures for physical security are in place to support the systems security requirements.
Maintaining an inventory of hardware and software for the information system.
Developing, coordinating, testing and training on Contingency Plans and Incident Response Plans.
Perform risk analyses to determine cost-effective and essential safeguards.
Support Incident Response and Contingency activities.
Able to perform security control assessment in using NIST 800-53A guidance.
Conduct Independent scans of the application, network and database (where required)
Provide continuous monitoring to enforce client security policy and procedures and create processes that will provide oversight into the following activities for the system owner
The ISSO should be intimately familiar with some aspects of the following:
Federal Government Information Assurance policies and regulations to include OMB requirements, FISMA, and NIST 800 series.
OMB A-123 circular; OMB A-130 circular; FIPS 140, 199, 200, 201; NIST SP 800-18, 37 Revision 1, 39, 53 Revisions 3 and 4, 53A Revision 1, 60 Volumes 1 and 2, 800-64 Revision 2, 137, 144, 147; CNSS 1253 and risk management methodologies.
Networks, network protocols, routers, and switches and how they interact with automated vulnerability assessment tools, open source vulnerability assessment tools and techniques used for evaluating security controls on Windows, Linux, and Unix operating systems, networking devices, databases and web servers.
automated vulnerability and risk assessment tools such as Nessus, AppDetective/DbProtect, Hailstorm, McAfee Vulnerability Manager (Foundstone), and NMAP.
enterprise level vulnerability scanning servers (Nessus preferred).
developing custom assessment scripts.
wireless LAN vulnerability assessments, including IEEE 802.11 standards.
Unix/Linux, Windows, and Macintosh.
Network Security Architecture.
firewalls, VPN, and intrusion detection systems.
TCP/IP protocols and networking architectures.
databases, applications, and Web server design and implementation.
Web Applications and services, Web Development, Java, Perl, Ruby, C++ Programming, Solaris, or Database (Oracle and SQL).
Active Top Secret clearance.
Minimum of 2-5 years of relevant experience in functional responsibility
Minimum Education: Bachelor’s Degree
Has demonstrated experience in administrating BSD/UNIX, Windows, Windows NT, LINUX, or open systems-compliant systems.
Thorough understanding and knowledge of FISMA and SA&A process.
Experience with vulnerability assessments tools such as Nessus, Foundstone, Cenzic, DBProtect and BigFix.
Understanding and experience with CSAM is a PLUS
Experience with NIST publications, OMB circulars and memoranda, and CNSS publications and their requirements and impact on system security.
Additionally, the individuals must demonstrate proficiency in the following areas:
Proficiency in writing technical analysis reports.
Strong written and oral communication skills.
Balancing security requirements with mission needs
Good judgment and business acumen
Project management (ability to track detailed tasks and ensure timely delivery)
Ability to work quickly, efficiently and accurately in a dynamic and fluid environment
A Sea of Choices – One Solution
There are almost as many IT security firms as there are organizations in need of their guidance. The big names boast decades of experience and a global reputation; the smaller names promise personalized work experience with lean operations.
We know there are a lot of firms vying for you. So why choose MindPoint Group?
MindPoint Group – The IT Security Job You’ve Been Looking For
At MindPoint Group, we specialize in one thing: IT security. In fact, our singular focus and reputation as cyber security specialist have earned us roles as trusted advisors to key government decision makers where we help shape IT security policy, engineer innovative security solutions, and support security operations.
At MindPoint Group, we hire only the most driven, most qualified IT security professionals, and we equip them with the tools and resources they need to deliver success. We are profoundly invested in selecting the right people to join our team and are equally driven to retain them for the long term. And so, when we find the right fit, we make it work. We offer challenging, growth-oriented assignments. Our collaborative culture unites our staff. And we reward employees with a competitive and exceptional benefits package.
MindPoint Group’s is deeply committed to our mission to become a trusted partner by consistently delivering proven, on point services to our clients. We strive to provide an organizational culture that fosters innovation, technical excellence, dedication to repeatable processes, and attention to detail. We believe that by empowering our employees to excel and providing them with the means to do so, MindPoint Group will consistently exceed our customers’ expectations.