user avatar

ISSE (Secure Development & Integration)

Crest Security Assurance

Sep 11
Secret
Mid Level Career (5+ yrs experience)
$146,000
No Traveling
IT - Security

Provide high-level ISSE support to integrate cybersecurity requirements and implement security controls throughout the RMF lifecycle, ensuring agency systems achieve and sustain their ATO. Coordinates with system owners and security personnel to prepare systems for authorization, categorize information and impact levels, select and tailor security controls, and document their implementation. This support extends to assessing security controls, contributing to authorization packages, and continuously monitoring the security posture of systems to ensure ongoing compliance and risk management.

The ISSE must demonstrate a strong understanding of network security mechanisms, endpoint detection and response (EDR) solutions, vulnerability management principles, and automated scanning technologies such as ACAS (Tenable Security Center and Nessus). While the ISSE may not directly perform scans or deploy these tools, they are expected to understand their capabilities, outputs, and integration with RMF processes in order to properly evaluate risk and advise system owners and authorizing officials.

Responsibilities

Coordinate with the Information System Owner (ISO) to define the authorization boundary and develop boundary diagram artifacts.
Analyze and document mission/business processes supported by the system to define comprehensive system security needs, directly linking security to operational objectives.
Develop and document robust System Security Plans (SSPs) and detailed Security Design Documents, providing a foundational understanding of the system's security posture.
Document information types and impact levels (confidentiality, integrity, availability), providing a granular understanding of data sensitivity.
Ensure the system categorization aligns with DoD mission assurance priorities, supporting critical defense functions.
Maintain working knowledge of EDR technologies and their role in providing advanced endpoint protection, threat detection, and response, in order to advise on appropriate security requirements.
Maintain working knowledge of ACAS (Tenable Security Center and Nessus), interpreting scan results and understanding how vulnerabilities, misconfigurations, and weaknesses are identified and prioritized.
Apply STIGs (Security Technical Implementation Guides) and hardening procedures to all IT assets as applicable, reducing the attack surface and mitigating known vulnerabilities.
Understand and communicate vulnerability management principles, including lifecycle management, risk ranking, remediation prioritization, and POA&M tracking, ensuring they are properly addressed within the RMF process.
Incorporate zero trust principles, network segmentation, and endpoint protection strategies into system designs to enforce least-privilege access and mitigate lateral movement.
Document control implementation in the SSP, maintaining accurate and up-to-date security documentation.
Conduct self-assessments and validate control effectiveness, documenting findings in Security Assessment Reports (SARs), providing an internal evaluation of security controls.
Ensure alignment with DoD Cybersecurity Strategy and acquisition lifecycle, integrating security considerations throughout the system's lifespan.
Provide evidence and artifacts in support of security control validation efforts, demonstrating the effectiveness of implemented controls.
Coordinate and schedule all assessment activities with the SCA and testing teams, facilitating thorough and efficient security evaluations.
Conduct Security Control Assessments for all RMF “Assess Only” cybersecurity assessments, providing dedicated evaluation for specific security concerns.
Coordinate with the SCA on development of the Security Assessment Plan (SAP) and Security Assessment Report (SAR), contributing to formal assessment documentation.
Remediate findings and update the POA&M (Plan of Action and Milestones), tracking the progress of vulnerability mitigation.
Develop risk mitigation strategies for vulnerabilities that are unable to be fully remediated.
Track and report on security control effectiveness and system changes, maintaining visibility into security performance.
Update SSP, POA&M, and SAR as system changes occur or as needed, but no less than annually, reflecting the current state of system security.
Participate in Annual Security Assessment Review (ASR) and Incident Response exercises, demonstrating preparedness and responsiveness to security events.
Support incident response coordination by understanding how EDR data, network forensics, and vulnerability scan outputs contribute to containment and recovery strategies.
Respond to cybersecurity incidents and environmental changes, ensuring rapid and effective incident handling.
Requirements:

Active Secret security clearance
At least 5 years of related experience
DoD IAT II required certification/s (one of the following):

o CCNA-Security

o CySA+ (CSA+)

o GICSP

o GSEC

o Security+ CE

o CND

o SSCP

CSSP-IS required certification/s (one of the following):

o Security+ CE

o CySA+

o GCIA

o GICSP

o GSEC

o CEH
Location: Remote Work Available - Fort Lee, VA or Smyrna, GA
group id: 90982409
N
Name HiddenRecruiter

Match Score

Powered by IntelliSearch™
image match score
Create an account or Login to see how closely you match to this job!

Similar Jobs


Job Category
IT - Security
Clearance Level
Secret