Principal Information System Security Officer - Greendale, United States - Chameleon Consulting Group

    Chameleon Consulting Group
    Chameleon Consulting Group Greendale, United States

    1 month ago

    Chameleon Consulting Group background
    Description
    Principal Information System Security Officer CCG delivers solutions to the most challenging problems our nation faces in cyberspace. We combine extensive cyber tradecraft with a principled, innovative, and asymmetric approach to deliver unparalleled results. Excellence is our standard and mission success is our metric.

    RoleAs a Principal ISSO at CCG, you will be directly embedded with CI/CD developers to ensure security requirements are understood in every phase of development.

    Additionally, you will be responsible for driving security innovation and implementation as part of the projects and CCG security posture as a whole.

    The role heavily relies on your ability to establish and maintain ATO packages and their Continuous Monitoring.

    We are looking for a passionate and independent information security professional who flourishes at being in the forefront of cutting-edge technology and has a desire to apply automated and Agile practices.*This is an on-site position that will require full time presence in Herndon, Virginia.

    ResponsibilitiesCreate and maintain automated cybersecurity mechanisms.
    Maintain cybersecurity best practices for containerized services and Infrastructure as Code within Kubernetes clusters and DevOps pipelines.
    Maintain communication with project engineers on the implementation of security controls and policy enforcement.
    Support the implementation of technologies into the CI/CD processes and systems to establish secure-by-default standards for CCG products.
    Evaluate, develop and/or implement information assurance guidelines and procedures.
    Recommend security solution mitigations and enhancements supporting information assurance guidelines and customer requirements.
    Perform vulnerability/risk analysis of computer systems and applications during all phases of the system development life cycle.
    Provide input into an Audit and Accountability Plan containing methods, procedures, and planned reviews for the continuing accreditation.
    Ensure that all information systems meet or exceed compliance requirements.
    Identify, report, and ensure the resolution of security violations.
    Monitor and review the regular updates/upgrades to equipment and procedures to maintain pace with cybersecurity requirements and business needs.

    Minimum Qualifications8+ years of experience working as an ISSOActive TS Clearance with SCI with PolyUnderstanding of CI/CD processes, cloud environments, and containerization.

    Ability to effectively communicate with various stakeholders and team membersStrong understanding of the Risk Management Framework (RMF) process, and System Development Life Cycle (SDLC)Experience auditing and performing control assessmentsExperience with integrating technologies and security solutions on information systemsDemonstrated experience getting new systems granted ATO.Demonstrated analytical and problem-solving skillsStrong understanding of microservices and DevOps practicesPreferred QualificationsCertified Information Systems Security Professional (CISSP)Experience using scanners (i.e.

    ACAS, Nessus, SonarQube)2 years experience in CI/CD environments2 years experience in Cloud environments2 years experience in containerizationTaken 3 or more systems/networks through all 7 steps of the RMF process (new system to ATO/ATC)Ability to identify needed changes to processes and activities and help to implement continuous improvement solutionsHave experience creating various types of vulnerability and assessment scans with multiple toolsExperience using eMASS or XactaWe are an equal opportunity employer.

    All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status.

    Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.

    #J-18808-Ljbffr