Security Officer

Remote
Digital Services Team /
Remote full-time /
Remote
We’re seeking a Security Officer (SO) responsible for providing security support services while meeting security control compliance requirements for a portfolio of systems at various states of maturity and modernization. This role will provide support for continuously monitoring the cybersecurity posture of systems to secure against cyber threats.  The SO’s primary responsibility is to facilitate security tool implementation, security tool usage, ensuring tools remain compliant and configured properly, all the while ensuring a successful program Authorization to Operate (ATO). Additionally, the SO is expected to take ownership of communication and visualization of security issues especially where coordination between product teams, information owners, engineering and infrastructure staff is necessary for remediation.   The SO owns coordination and response to the agency’s security related inquires, compliance with agency policy, security controls, maintenance of security documentation and artifacts.  The SO will act as the primary liaison to provide timely and accurate responses to security related data calls (System Security & Compliance Status, Vulnerability and Compliance scanning issues).  Provide subject matter expertise throughout all phases of the system development lifecycle. SO will interface with multiple stakeholders through multiple touch points weekly.  

Responsibilities:

    • Work closely with the Product Owners, ISSOs, engineering and infrastructure staff to provide guidance on implementation if security policies, standards, and procedures 
    • Analyze new or updated security requirements, collaborate with stakeholders, and develop responses that are clear and accurate 
    • Support the review and update of ATO artifacts such as System Security Plans, Information System Contingency Plans, Configuration and Change Management Plans, Incident Response Plans, Privacy Impact Analysis, and more 
    • Interpret security risk assessment, review security scan results, assess security vulnerabilities and support the development and remediation of vulnerability and compliance issues via Plan of Action and Milestones (POA&Ms) 
    • Support the development of implementation and design documentation relating to security feature implementation 
    • Work with engineering and infrastructure personnel to document remediation for vulnerabilities and non-compliance issues 
    • Analyze and interpret agency security requirements and provide governance communication to non-security personnel 
    • Collaborate with product teams, ISSOs and other stakeholders in support of continuous monitoring and ATO efforts 
    • Conducts vulnerability assessments and monitors systems, networks, databases and Web-based assets for potential system breaches. Recommends and takes the lead on implementing changes to enhance security systems, prevent unauthorized access, and help mitigate security vulnerabilities. 
    • Responds to alerts from information security tools. Reports, investigates, and resolves higher level security incidents.  
    • Responds to security tool outages, degradations in service, tune security rules and alerts, and setup/maintain security tool dashboards and reporting. 
    • Research security trends, new methods, and techniques used in unauthorized access of data to preemptively eliminate the possibility of system breach. Ensures compliance with regulations and privacy laws. Conducts research to identify new attack vectors. 
    • Educates and communicates security requirements and procedures to all users and new employees. 
    • Recommend process improvements to the information system for risk mitigation. 
    • Applies iterative security automation to all program aspects increasing overall security posture iteratively and never accepts the status quo. 
    • Provide audit log review in Splunk, present any findings to ISSO, and plan for any investigation or remediation activities.  
    • Periodic user and privileged access reviews. 

Qualifications:

    • Minimum of 4 years related experience. 
    • A Bachelor’s degree in Computer Science, Information Systems, Engineering, Business, or other related scientific or technical discipline. With six years of general information technology experience and at least four years of specialized experience, a degree is not required. 
    • Familiarity with Agile Methodologies. 
    • Working knowledge of AWS Security tools, their functionality, and purpose 
    • Assist customer with defining appropriate change management processes (Responsible for documenting application criticality, privacy, and security impact analysis) 
    • Knowledge of hardening standards (DISA STIG, CIS) 
    • Understanding of NIST Risk Management Framework and NIST 800-53 rev5 
    • Experience with CI/CD, defining security decision gates and DevSecOps  
    • Know the difference between SAST, DAST, IAST, OAST tools and their functions, benefits, and weaknesses within CI/CD  
    • Understanding of business security practices and procedures; knowledge of current security tools available; hardware/software security implementation; different communication protocols; encryption techniques/tools; familiarity with commercial products; and current Internet technology. 
    • Understands continuous automated security practices applied to data and application engineering teams. 
    • Prior experience managing systems in AWS cloud environments, familiarity with AWS Tools and Services 
    • Experience with designing security “baked-in” to any architecture: Cloud and IaC, Applications, Web application, Data Processing, Data Centric Applications, AI/ML, CICD Pipelines; seeks automation driven designs. 
    • Demonstrated work experience with the following: computer networking, cryptography, security engineering and architecture, vulnerability assessments, or operating systems required.  
    • Broad experience using cloud services, Linux systems, and Development/Data engineering core tools Github, GitHub Actions, Security Tools, etc. 
    • Demonstrated working knowledge of vulnerability and compliance scanning tools. 
    • Understands how to assess vulnerabilities and provide recommendations regardless of first-hand knowledge of the application or system. 
    • Proven ability to work effectively both independently and/or in a team setting.  
    • Must possess strong analytical and problem-solving abilities; and strong critical-thinking skills in complex communication environments.  
    • Strong attention to detail. Required to manage/follow-through of multiple independent tasks, dependencies across intra/inter-project teams 
    • Excellent organizational and time-management skills in a fast-paced environment.  
    • Excellent customer service skills with the ability to deal tactfully, confidently, and ethically with both internal and external customers. 
    • Experience with Government Agency Security Assessment Process in support of maintaining and/or establishing an ATO and the appropriate security boundary. 
    • Experience with Atlassian Jira & Confluence 
    • Excellent command of written and spoken English.   
    • Ability to obtain and maintain a Public Trust,residing in the United States 
    •  

Desired Qualifications:

    • Federal Government contracting work experience 
    • Highly preferred industry certification such as the CISSP, CEH, GIAC, etc. 
    • Experience with Security Information and Event Management (SIEM) systems (i.e Splunk)