user avatar

Information Systems Security Officer- Journeyman

Potawatomi Federal Solutions, LLC.

Today
Secret
Unspecified
Unspecified
IT - Security
Hill Air Force Base, UT (On-Site/Office)

Position Title: Information Systems Security Officer- Journeyman

Location: Hill AFB, Utah

Clearance: ****This position requires an Active Secret Clearance****

Salary: $135,000.00 - $145,000.00

Position Summary:

Command Cyber Solutions is looking for an Information System Security Officer (ISSO) Journeyman to support HILL COMPONENT ENTERPRISE DATA CENTER (CEDC) IT OPERATIONS AND MAINTENANCE SERVICES located at Hill Air Force Base, Utah ( HAFB) . This program aims to modernize legacy USAF network infrastructure and migrate services into Cloud Environments. The Information Systems Security Officer (ISSO) is responsible for ensuring the confidentiality, integrity, and availability of assigned information systems in accordance with Department of Defense (DoD) and Department of the Air Force policies and procedures. The ISSO will play a crucial role in implementing and maintaining a robust cybersecurity posture, conducting security assessments, managing risks, and ensuring compliance with applicable regulations and standards. This position requires a strong understanding of information security principles, DoD security requirements, and excellent communication and problem-solving skills.

Essential Duties & Responsibilities:
  • Security Planning and Implementation:
    • Assist in developing, implementing, and maintaining security plans, policies, and procedures for assigned information systems in accordance with DoD Instruction 8510.01 (Risk Management Framework for DoD Information Technology) and other applicable guidance.
    • Assist in the selection and implementation of security controls to protect information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
    • Assist risk assessments and vulnerability assessments to identify security weaknesses and recommend mitigation strategies.
    • Work with system administrators and other IT personnel to ensure security controls are properly implemented and maintained.
  • Security Monitoring and Incident Response:
    • Monitor information systems for security incidents and anomalies, and investigate and respond to security incidents in accordance with established procedures.
    • Analyze security logs and other data sources to identify potential security threats and vulnerabilities.
    • Report security incidents to the appropriate authorities, including the [Insert Organization's Incident Response Team].
    • Participate in incident response exercises and drills.


  • Compliance and Audit:
    • Ensure that assigned information systems comply with all applicable DoD security policies, regulations, and standards, including but not limited to:
      • DoD Instruction 8510.01 (Risk Management Framework for DoD Information Technology)
      • NIST Special Publications (e.g., SP 800-53, SP 800-37)
      • Security Technical Implementation Guides (STIGs)
      • Information Assurance Vulnerability Alerts (IAVAs)
    • Conduct regular security reviews and audits to verify compliance with security requirements.
    • Prepare and maintain documentation to support security audits and assessments.
    • Assist with the development and implementation of corrective action plans to address security deficiencies.
  • System Authorization and Accreditation (A&A)
    • Manage the A&A/A&A process for assigned information systems, including the preparation of security documentation (e.g., System Security Plan, Security Assessment Report, Plan of Action and Milestones (POA&M)).
    • Coordinate with authorizing officials and other stakeholders to obtain and maintain system authorizations.
    • Ensure that systems are operated in accordance with their authorization.


Education, Certification & Experience Requirements:

Certification/Clearance Required:
  • Active Secret Clearance

  • Security+ CE Certification


Education/Experience Required:
  • Bachelor's Degree in Business or IT related field with three (3) or more years of experience in Information Security, Vulnerability Management or related field. Master's Degree and 2+ years of experience can be substituted.Must have relevant Air Force Risk Management Framework (RMF) experience
  • Must have experience with one or more of the following:
    • Experience successfully getting systems through the complete ATO process
    • Vulnerability management, including running scans as well as evaluating and prioritizing the outputs
    • Experience evaluating STIGs and completing STIG checklists
    • Patching
  • Experience using eMASS or other related tools


Knowledge, Skills & Abilities:

Knowledge:

  • Thorough Knowledge of security control selection and tailoring.

  • Basic knowledge of common security controls and their purpose (e.g., access control, audit and accountability, identification and authentication).

  • Familiarity with NIST SP 800-53 security controls and the various security documents that make up an ATO package (e.g., System Security Plan (SSP), Security Assessment Report (SAR), Plan of Action and Milestones (POA&M)).

  • Understanding of how security controls are implemented and assessed.

  • Understanding of Cloud Migration strategies and security requirements

Skills:
  • Strong organizational and problem-solving skills.
  • Excellent communication and interpersonal skills.
  • Data Center Security
  • Basic Risk Management
  • Compliance Auditing
  • Cybersecurity Training and Awareness

Abilities:

  • Ability to clearly and concisely document system security information

Command Cyber Solutions:

We recognize that our success begins with our people. We are dedicated to fostering a professional, collaborative, and growth-oriented environment where employees are empowered to excel and advance their careers, CCS offers opportunities to contribute to high-impact federal initiatives, supported by robust professional development programs, competitive compensation, comprehensive benefits, and flexible work arrangements. We prioritize investing in our workforce, ensuring each team member has the resources, support, and career pathways to achieve long-term success while delivering meaningful results for our clients.

Culture:

At CCS, you'll be a part of a team that genuinely supports one another and where leadership is invested in the well-being and success of every employee. We foster a work culture where people are valued for who they are, not just what they do, and where your career goals are taken seriously. You'll be encouraged to grow through mentorship, hands-on experience, and access to continued learning opportunities that align with your aspirations. Whether you're looking to deepen your expertise, earn new certifications, or take on leadership roles, CCS provides the environment and support to help you get there. Leadership is approachable, collaboration is natural, and success is shared. At CCS, you're not just joining a company; you're joining a community committed to your growth and success.

Benefits:

We offer a comprehensive benefits package designed to support the health, financial security, and overall well-being of our employees and their families. Our offerings include medical and prescription drug plans, dental coverage, group life insurance, and options for supplemental life insurance to provide additional protection. We also provide short-term and long-term disability insurance, flexible spending accounts, and employee assistance programs to help employees manage personal and professional needs. Our package also includes identity theft protection and a competitive 401(k) retirement savings plan with company contributions, giving employees valuable resources to protect their future and achieve long-term financial goals.

EEO Statement:

Command Cyber Solutions, LLC is an equal opportunity employer. Command Cyber solutions, LLC does not discriminate in employment opportunities or practices on the basis of race, color, religion, sex, national origin, age, disability, marital status or any other characteristic protected by law.

#ClearanceJobs
group id: RTX15bb42
Find Potawatomi Federal Solutions, LLC. on Social Media
Network Employers
user avatar
About Us
Potawatomi Federal Solutions is a 100% tribally owned small business of the Forest County Potawatomi Community of Wisconsin. In 2007, we launched with one mission in mind: to create a profitable tribal enterprise to allow us to invest in the health, wellness, education, environment and future of our people for generations to come. We take pride in our reputation as a prime, small business leader. Over the years, we’ve been entrusted to carry out our federal clients’ missions with orders that impact national interests, and we work hard to build long-term, valuable relationships with our federal contracting partners. When you choose to work with Potawatomi Federal Solutions, your organization benefits from a project management team that is committed to hard work, attention to detail, and getting the job done right.

Potawatomi Federal Solutions, LLC. Jobs


Job Category
IT - Security
Clearance Level
Secret