Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become An Information Systems Security Officer

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As An Information Systems Security Officer

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $107,610

    Average Salary

What Does An Information Systems Security Officer Do At Caci International

* Works closely with the FEMA ISSO to Develop, implement, and manage a formal Information and Information Systems Security Program
* Develop, implement, maintain and enforce Information Security Policies and Procedures
* Responsible for systems security certification and accreditation (C&A)
* Developers materials for and ensures that personnel follows established Information Security Policies and Procedures
* Develop and maintain materials for and ensure that personnel receives the required Technical and Security Training
* Manage and coordinate information security inspections and incident responses
* Ensure that proper protections and corrective measures have been taken when an incident or vulnerability has been discovered
* Ensure that proper protections and corrective measures have been taken when an incident or vulnerability has been discovered
* Perform risk assessments
* Develops and maintains Disaster Recovery and Continuity of Operations plans
* Maintains documentation and evidence
* Recommends improvements and upgrades to the security posture of the environment
* Work with the infrastructure team to identify and track the deployments of patches and other technical controls to address security requirements
* Performs audit activities to report on compliance and security configurations

What Does An Information Systems Security Officer Do At Tetra Tech

* Strong knowledge of NIST, Risk Management Framework (RMF) / Certification & Accreditation is required
* Coordinate the implementation of security and privacy controls for Information Technology (IT) systems
* Select appropriate security controls for IT systems based on NIST guidance, working with teams to ensure proper implementation
* Research, develop, implement, test and review customer's information security in order to protect information and prevent unauthorized access
* Officers inform users about security measures, explain potential threats, install software, implement security measures and monitor networks
* Develop Impact Assessment and Security Assessment Reports
* Issue Resolution Report and Remediation Status Report and Security Plan

What Does An Information Systems Security Officer Do At SRA International, Inc., A CSRA Company

* Implement security requirements based on laws, regulations or Presidential directives in compliance with FISMA and DHS Cyber-security initiatives
* Integrate security design principles across disciplines and SELC process
* Review proposed new systems, networks, software for potential security risks
* Review security related product selection and implementation activities
* Participate and provide security support in Vendors Source Selection process
* Define the scope and level of detail for security plans applicable to the system
* Identify need for changes based on new security technology and evolving threats
* Analyze change requests to the system for security posture impact/updates
* Review security incident response policy, manage security incident procedures
* Execute duties described in DHS ISSO and DHS Security Authorization Guide
* Manage and maintain system authorization status or Authority to Operate (ATO)
* Perform Certification and Accreditation (C&A) to existing and new systems
* Responsible for oversight and coordination of C&A activities of each system
* Apply CBP Security Certification and Accreditation Process to assigned systems
* Generate Security Artifacts templates for C&A artifacts requirement
* Review and recommend approval on systems FIPS 199 and E
* Authentication
* Prepare and provide DHS formatted System Security Plan
* Prepare System Owner and Information System Security Officer letters
* Coordinate Security Test and Evaluation events between involved stakeholders
* Participate Security Test and Evaluation process and Review ST&E report
* Perform Vulnerability Assessment review and generate reports for System Owner and stakeholders
* Is this job the next step in your career? Are you ready to help keep America’s border safe

What Does An Information Systems Security Officer Do At Leidos

* Perform regular audits of Information Systems (IS), including review of system audit logs, verification and maintenance of regular backups of the IS, and inventorying of IS components
* Brief team members of their IS responsibilities
* Creating and Managing user accounts on the IS
* Assisting the Facility Security Officer (FSO) for regular Media inventory
* Assisting the Information System Security Manager (ISSM) in preparing the IS for periodic reaccreditation
* Ensure the implementation of security measures in accordance with the MSSP and ISSM’s guidance.
* Identify and document any unique threats to the Information Systems
* Perform periodic Risk Assessments of the Information Systems
* Develop and implement certification tests of the IS, as required by the CSA and ISSM
* Assist with the maintenance of the MSSP and Supplemental SSPs for all information systems within the facility
* Ensure that each IS within the facility has an active Configuration Management Program
* Be a part of the Configuration Management Program for each IS within the facility
* Ensure that unauthorized personnel are not granted use of, or access to, any IS within the facility
* Ensure that system recovery processes are monitored and tested to ensure that security features and logs are properly restored
* Assist with the implementation of facility procedures, under the direction of the ISSM, to include media handling, security incident handling, IS User Briefings, and IS security reviews and audits
* Assist with the evaluation of changes or additions to the IS within the facility, work with the ISSM to determine security relevance, and make recommendations for approval or denial to the ISSM.
* Providing general technical support to users and general system administrator support

What Does An Information Systems Security Officer Do At General Atomics and Affiliated Companies

* Works the with the Information System Security Manager (ISSM) to interpret regulations as they apply to information systems, platforms, and IT operating processes, practices and procedures..
* Participates in the development and maintenance of System Security Plans, instructions, guidance, and standard operating procedures.
* Audits multiple information systems for anomalies, and provides feedback to the ISSM
* Builds information systems for deployment in classified areas (e.g. installs Windows/Linux, installs new hardware, troubleshoots faults).
* Participates in identifying risks and makes recommendations for improvements; may participate in corrective measures when incidents or vulnerabilities are discovered.
* Maintains knowledge of applicable policies, regulations, and compliance documents related to classified computing assets and environments.
* May represent the organization as a primary contact with internal representatives.
* Maintains the strict confidentiality of sensitive information.
* Performs other duties as assigned.
* Must possess and maintain a DoD Secret security clearance.
* Must maintain DoD 8570 IAM Level I (e.g.
* Security +) professional certification as required by customers or contractual obligations.
* Responsible for observing all laws, regulations and other applicable obligations wherever and whenever business is conducted on behalf of the Company.
* Expected to work in a safe manner in accordance with established operating procedures and practices.
* Some local travel required

Show More

Show Less

How To Become An Information Systems Security Officer

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.

Education

Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.

Advancement

Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Information Systems Security Officer jobs

Add To My Jobs
Job type you want
Full Time
Part Time
Internship
Temporary

Top Skills for An Information Systems Security Officer

ProceduresAssuranceVulnerabilityAssessmentsInformationSystemSecurityIssoInformationSecurityPoliciesSystemAdministratorsWindowsDisaDODSecurityRequirementsPOAFismaConfigurationManagementContingencyPlansMilestonesNispomIssmDefenseSecurityServiceIncidentResponse

Show More

Top Information Systems Security Officer Skills

  1. Procedures
  2. Assurance
  3. Vulnerability Assessments
You can check out examples of real life uses of top skills on resumes here:
  • Conducted periodic reviews and inspections to ensure compliance with established policies and procedures.
  • Apply IT principles, methods, and practices in the specialty area of Information Assurance.
  • Possess knowledge of risk assessments, vulnerability assessments, penetration testing and certification & accreditation of networks.
  • Assist the ISSM in reporting and mitigation of information system security incidents.
  • Managed nine commands information assurance as the ISSO.

Top Information Systems Security Officer Employers

Information Systems Security Officer Videos

Q&A - Salaries for Computer Jobs [How much $$$ can you make?]

Q&A -- Is there Job Security in I.T.?

A day in the life of Andrea Simmons, Chief Information Security Officer, HP Enterprise Services

×