Are you passionate about cybersecurity and innovative IT solutions? Join our dynamic team as an Information Systems Security Officer (ISSO)! This position is crucial for ensuring the security, compliance, and operational excellence of our cutting-edge information systems.
Mission
Enable TI to identify, win, and support space, avionics, and defense electronics customers by ensuring the security, compliance, and operational excellence of our cutting-edge information systems.
As an Information Systems Security Officer (ISSO), you will play a mission-critical role in supporting the implementation and operation of secure, compliant cloud environments in support of TI Federal’s work with government, defense, and aerospace customers. You will be responsible for leading, under the direction of the TI Federal Information Systems Security Manager (ISSM), TI Federal’s efforts to achieve Authorization to Operate (ATO) for our information systems and design, implement, and operate the processes necessary to ensure continuous compliance.
Key Responsibilities:
Cybersecurity Compliance & Risk Management:
- Risk Management Framework (RMF) Management: Support the full life-cycle Assessment and Authorization (A&A) process (Steps 1–6) to achieve and maintain an Authorization to Operate (ATO).
- Documentation Support: Review, maintain, and update security documentation, including System Security Plans (SSP), Plan of Action and Milestones (POA&M), Security Assessment Reports (SAR), and Contingency Plans.
- Continuous Monitoring: Conduct periodic reviews of information systems to verify compliance with security authorization packages, including management of advanced cybersecurity tools for continuous monitoring (CONMON).
- Vulnerability Remediation: Manage vulnerability scanning tools (e.g., ACAS/Nessus) and ensure patch management (IAVM) compliance, coordinating with IT staff to remediate weaknesses.
- Security Control Assessment: Implement and validate NIST SP 800-53 controls and DISA STIGs.
- User Security Awareness: Ensure system users are trained and briefed on security awareness policies before being granted system access.
- Collaborate and Secure: Work with DCSA, ITPSO, ISSM, and the site Facility Security Officer (FSO) to ensure continuous compliance.