Harris Geospatial Solutions
Specialist, Cyber Intelligence 1
Harris Geospatial Solutions, Greenville, Texas, United States, 75402
Job Title: Specialist, Cyber Intelligence (ISSO)
Job ID: 32733
Job Location: Greenville, Texas; On-site
Job Schedule: 9/80, off every other Friday, 1st shift
Job Description
L3Harris Greenville, Texas, is seeking an Information System Security Officer (ISSO) in support of Department of Defense programs for our facility located in Greenville, TX.
Primary responsibilities of this position include:
Identifying information system vulnerabilities and working with system owners to implement countermeasures or corrections
Interacting with users and the ISSM when changes occur that may affect the information system accreditation/certification
Identifying the information protection needs for systems, software and networks
Use Vulnerability Scanning Tools to scan networks/applications and identify weaknesses. Use results and correct/remediate the findings.
Track Software Vulnerability Findings and Software Patches.
Provide input for various artifacts supporting the RMF package to include the System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Plan of Actions & Milestones (POA&M), Continuous Monitoring (ConMon) Plan, CONOPS, and other RMF BoE artifacts.
Support IA Program compliance by performing periodic self-inspections, tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed.
Participate in documenting and reviewing security related workflows and procedures to mitigate vulnerabilities and recommend changes to system or system components.
Essential Functions:
Identifying information system vulnerabilities and working with system owners to implement countermeasures or corrections
Interacting with users and the ISSM when changes occur that may affect the information system accreditation/certification
Identifying the information protection needs for systems, software and networks
Use Vulnerability Scanning Tools to scan networks/applications and identify weaknesses. Use results and correct/remediate the findings.
Track Software Vulnerability Findings and Software Patches.
Provide input for various artifacts supporting the RMF package to include the System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Plan of Actions & Milestones (POA&M), Continuous Monitoring (ConMon) Plan, CONOPS, and other RMF BoE artifacts.
Support IA Program compliance by performing periodic self-inspections, tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed.
Participate in documenting and reviewing security related workflows and procedures to mitigate vulnerabilities and recommend changes to system or system components.
Ability to obtain and maintain any additional clearances as required.
Up to 5% travel may be required.
Qualifications:
Bachelor’s Degree and minimum 4 years of prior relevant experience. Graduate Degree and a minimum of 2 years of prior related experience. In lieu of a degree, minimum of 8 years of prior related experience.
Must have an Active Top Secret clearance with SCI eligibility
Relevant experience with Windows 10 operating systems, Linux operating systems and other related peripherals.
Experience using Microsoft Office products.
Experience with Nessus, ACASS or other vulnerability scanning software
Experience with RMF/Assessment and Authorization (A&A) safeguards to meet various regulatory requirements
Candidate should hold a DoD 8570/8140 approved baseline certification. Security+ or equivalent at minimum
Preferred Skills:
Experience with configuration/certification and auditing/analysis of Windows and Linux
Experience with applying, searching, leveraging SCAP and STIGs
Demonstrate excellent organizational, decision-making, and problem-solving skills.
Experience with technical configuration standards relating to information system security.
Well versed in risk management, mitigation, and customer service.
Excellent communication skills (written, verbal, & presentation)
Experience in SCI environments
#LI-TD4
L3Harris Technologies is proud to be an Equal Opportunity Employer. L3Harris is committed to treating all employees and applicants for employment with respect and dignity and maintaining a workplace that is free from unlawful discrimination. All applicants will be considered for employment without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender (including pregnancy, childbirth, breastfeeding or other related medical conditions), gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, characteristic or membership in any other group protected by federal, state or local laws. L3Harris maintains a drug-free workplace and performs pre-employment substance abuse testing and background checks, where permitted by law.
Please be aware many of our positions require the ability to obtain a security clearance. Security clearances may only be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet eligibility requirements for access to classified information.
By submitting your resume for this position, you understand and agree that L3Harris Technologies may share your resume, as well as any other related personal information or documentation you provide, with its subsidiaries and affiliated companies for the purpose of considering you for other available positions.
L3Harris Technologies is an E-Verify Employer. Please click here for the E-Verify Poster in English or Spanish. For information regarding your Right To Work, please click here for English or Spanish.
#J-18808-Ljbffr
Primary responsibilities of this position include:
Identifying information system vulnerabilities and working with system owners to implement countermeasures or corrections
Interacting with users and the ISSM when changes occur that may affect the information system accreditation/certification
Identifying the information protection needs for systems, software and networks
Use Vulnerability Scanning Tools to scan networks/applications and identify weaknesses. Use results and correct/remediate the findings.
Track Software Vulnerability Findings and Software Patches.
Provide input for various artifacts supporting the RMF package to include the System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Plan of Actions & Milestones (POA&M), Continuous Monitoring (ConMon) Plan, CONOPS, and other RMF BoE artifacts.
Support IA Program compliance by performing periodic self-inspections, tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed.
Participate in documenting and reviewing security related workflows and procedures to mitigate vulnerabilities and recommend changes to system or system components.
Essential Functions:
Identifying information system vulnerabilities and working with system owners to implement countermeasures or corrections
Interacting with users and the ISSM when changes occur that may affect the information system accreditation/certification
Identifying the information protection needs for systems, software and networks
Use Vulnerability Scanning Tools to scan networks/applications and identify weaknesses. Use results and correct/remediate the findings.
Track Software Vulnerability Findings and Software Patches.
Provide input for various artifacts supporting the RMF package to include the System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Plan of Actions & Milestones (POA&M), Continuous Monitoring (ConMon) Plan, CONOPS, and other RMF BoE artifacts.
Support IA Program compliance by performing periodic self-inspections, tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed.
Participate in documenting and reviewing security related workflows and procedures to mitigate vulnerabilities and recommend changes to system or system components.
Ability to obtain and maintain any additional clearances as required.
Up to 5% travel may be required.
Qualifications:
Bachelor’s Degree and minimum 4 years of prior relevant experience. Graduate Degree and a minimum of 2 years of prior related experience. In lieu of a degree, minimum of 8 years of prior related experience.
Must have an Active Top Secret clearance with SCI eligibility
Relevant experience with Windows 10 operating systems, Linux operating systems and other related peripherals.
Experience using Microsoft Office products.
Experience with Nessus, ACASS or other vulnerability scanning software
Experience with RMF/Assessment and Authorization (A&A) safeguards to meet various regulatory requirements
Candidate should hold a DoD 8570/8140 approved baseline certification. Security+ or equivalent at minimum
Preferred Skills:
Experience with configuration/certification and auditing/analysis of Windows and Linux
Experience with applying, searching, leveraging SCAP and STIGs
Demonstrate excellent organizational, decision-making, and problem-solving skills.
Experience with technical configuration standards relating to information system security.
Well versed in risk management, mitigation, and customer service.
Excellent communication skills (written, verbal, & presentation)
Experience in SCI environments
#LI-TD4
L3Harris Technologies is proud to be an Equal Opportunity Employer. L3Harris is committed to treating all employees and applicants for employment with respect and dignity and maintaining a workplace that is free from unlawful discrimination. All applicants will be considered for employment without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender (including pregnancy, childbirth, breastfeeding or other related medical conditions), gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, characteristic or membership in any other group protected by federal, state or local laws. L3Harris maintains a drug-free workplace and performs pre-employment substance abuse testing and background checks, where permitted by law.
Please be aware many of our positions require the ability to obtain a security clearance. Security clearances may only be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet eligibility requirements for access to classified information.
By submitting your resume for this position, you understand and agree that L3Harris Technologies may share your resume, as well as any other related personal information or documentation you provide, with its subsidiaries and affiliated companies for the purpose of considering you for other available positions.
L3Harris Technologies is an E-Verify Employer. Please click here for the E-Verify Poster in English or Spanish. For information regarding your Right To Work, please click here for English or Spanish.
#J-18808-Ljbffr