Principal Information System Security Officer - Greendale, United States - Chameleon Consulting Group

    Chameleon Consulting Group
    Chameleon Consulting Group Greendale, United States

    1 month ago

    Chameleon Consulting Group background
    Description
    Principal Information System Security Officer

    CCG delivers solutions to the most challenging problems our nation faces in cyberspace. We combine extensive cyber tradecraft with a principled, innovative, and asymmetric approach to deliver unparalleled results. Excellence is our standard and mission success is our metric.
    Role

    As a Principal ISSO at CCG, you will be directly embedded with CI/CD developers to ensure security requirements are understood in every phase of development.

    Additionally, you will be responsible for driving security innovation and implementation as part of the projects and CCG security posture as a whole.

    The role heavily relies on your ability to establish and maintain ATO packages and their Continuous Monitoring.

    We are looking for a passionate and independent information security professional who flourishes at being in the forefront of cutting-edge technology and has a desire to apply automated and Agile practices.

    *This is an on-site position that will require full time presence in Herndon, Virginia.
    Responsibilities
    Create and maintain automated cybersecurity mechanisms.
    Maintain cybersecurity best practices for containerized services and Infrastructure as Code within Kubernetes clusters and DevOps pipelines.
    Maintain communication with project engineers on the implementation of security controls and policy enforcement.
    Support the implementation of technologies into the CI/CD processes and systems to establish secure-by-default standards for CCG products.
    Evaluate, develop and/or implement information assurance guidelines and procedures.
    Recommend security solution mitigations and enhancements supporting information assurance guidelines and customer requirements.
    Perform vulnerability/risk analysis of computer systems and applications during all phases of the system development life cycle.
    Provide input into an Audit and Accountability Plan containing methods, procedures, and planned reviews for the continuing accreditation.
    Ensure that all information systems meet or exceed compliance requirements.
    Identify, report, and ensure the resolution of security violations.
    Monitor and review the regular updates/upgrades to equipment and procedures to maintain pace with cybersecurity requirements and business needs.
    Minimum Qualifications
    8+ years of experience working as an ISSO
    Active TS Clearance with SCI with Poly
    Understanding of CI/CD processes, cloud

    environments, and containerization.
    Ability to effectively communicate with various stakeholders and team members
    Strong understanding of the Risk Management Framework (RMF) process, and System Development Life Cycle (SDLC)
    Experience auditing and performing control assessments
    Experience with integrating technologies and security solutions on information systems
    Demonstrated experience getting new systems granted ATO.
    Demonstrated analytical and problem-solving skills
    Strong understanding of microservices and DevOps practices
    Preferred Qualifications
    Certified Information Systems Security Professional (CISSP)
    Experience using scanners (i.e. ACAS, Nessus, SonarQube)
    2 years' experience in CI/CD environments
    2 years' experience in Cloud environments
    2 years' experience in containerization
    Taken 3 or more systems/networks through all 7 steps of the RMF process (new system to ATO/ATC)
    Ability to identify needed changes to processes and activities and help to implement continuous improvement solutions
    Have experience creating various types of vulnerability and assessment scans with multiple tools
    Experience using eMASS or Xacta
    We are an equal opportunity employer.

    All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status.

    Explore more InfoSec / Cybersecurity career opportunities


    Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.

    #J-18808-Ljbffr