Information System Security Officer

Ashburn, VA
Defense – Cyber/Security /
Regular /
Hybrid
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.

Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.

Requisition #: 381
Job Title: Information System Security Officer
Location: Ashburn, Virginia
Clearance Level: CBP Full BI - 1st priority
Any DHS badge + DoD Top Secret or Secret - 2nd choice
DoD Secret or Top Secret + willingness to get CBP clearance - 3rd choice (it can take 45 days to 6 months to obtain a CBP clearance – work can only begin once the clearance is fully adjudicated)
Required Certification(s): 
·       CompTIA Network+, CompTIA Security +, CISSP and Security auditing are recommended. CSAM cert preferred.


SUMMARY
The U.S. Customs and Border Protection (CBP) Office of Information and Technology (OIT), Enterprise Infrastructure and Operation Directorate (EIOD), Network Architecture and Engineering Division (NAED) provides management services and oversight of the CBP infrastructure to protect, defend and restore the confidentiality, integrity and availability of CBP mission essential data communications and applications. The purpose of this task order is to provide network architecture and network engineering services. NAE ensures a standardized, high performance, and secure enterprise network architecture for the CBP enterprise that seamlessly integrates existing and emerging technologies. NAED, which comprises the Network Architecture Branch (NAB) and Network Engineering Branch (NEB).
The ISSO will be the Designated Person(s) assigned to one or more existing FISMA Systems of Record as well as new IT Systems that are slated as new work products to develop an Authority to Operate (ATO) and follow-on Continuous Monitored system.  As a Designated ISSO, they will sign a DHS sponsored Letter that lays out the roles and responsibilities of the ISSO function to maintain Compliance requirements on a daily basis.  The ISSO will report to a Designated Information System Security Manager (ISSM) and the Director of Security. Due to the importance of keeping system(s) updated to meet FISMA guidelines, while supporting DHS/CISA directives around limiting vulnerabilities, the ISSO role is of upmost importance throughout its lifecycle.


JOB DUTIES AND RESPONSIBILITIES
·       Document and provide information on security controls (implemented in systems being engineered, implemented, or maintained by NAE) as directed by the Government.
·       Make recommendations, implement security controls, and/or reengineer systems to address Plan of Action and Milestones (POA&M) and audit findings.
·       Implement and document security controls and applicable processes for CBP systems to ensure compliance with the CBP Risk Management Framework, FISMA regulations, and applicable DHS/CBP/DoD security policies.
·       Provide expert analysis and recommendations on risk (to include impact and likelihood) and mitigation options for security findings, gaps, and vulnerabilities. This includes developing appropriate responses to audit report findings. If risks cannot be resolved, the ISSO will work with the Director of Security, ISSM, and System Owner (SO) to develop a Deviation Waiver Request (Risk Acceptance) based on thorough analysis and industry standards identifying the risk, impact/threat if exploited, existing countermeasures, risk level, and reason/justification for risk.

QUALIFICATIONS
Required Certifications
·       CompTIA Network+, CompTIA Security +, CISSP and Security auditing are recommended. CSAM cert preferred.
Education, Background, and Years of Experience
·       Senior ISSO role will highlight past experiences over a 5-to 10-year period.

ADDITIONAL SKILLS & QUALIFICATIONS
Required Skills
·       A senior ISSO role will highlight past experiences over a 5-to 10-year period.
·       Must have a background with Zero Trust compliance.
·       Familiarity with Palo Alto, Zscaler, and Mobility support.
Previous work experience in the following area includes, but is not limited to:
·       Familiarity with network and information system security principles and best practices.
·       In-depth knowledge of the Risk Management Framework (RMF), the NIST publications, and the DHS 4300A.
·       Experience with implementing the NIST 800-53 Security Controls in an Assessment &  Authorization (A&A) process.
·       Experience reviewing Nessus scans, managing vulnerability mitigation and information security process in an Enterprise environment.
·       Basic understanding of Enterprise networking concepts.
·       Ability to work well within a team environment and build rapport with government and  customer organizations.



WORKING CONDITIONS
Environmental Conditions
·       The primary worksite will be Government sites within the National Capital Region (NCR) and Northern
·       Virginia. There will be occasions where the Contractor will have to travel to colocations in Ashburn, VA,
·       San Jose, CA. and Durham, NC as well as the National Data Center (NDC) in Northern Virginia. The
·       Contractor will also be required to travel field sites within the Continental United States (CONUS),
·       Outside Continental United States (OCONUS), and international sites to support requirements.
Strength Demands
·       Light – 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs.  A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.
Physical Requirements
·       Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; Stoop, Kneel, Crouch, or Crawl; See; Push or Pull; Climb (stairs, ladders) or Balance (ascend / descend, work atop, traverse).
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.

Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.

Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.

Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.

Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.

Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.

Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)