Cybersecurity Analyst

Spry Methods
Summary
Join Spry Methods as an ISSO supporting the Department of Interior's Cybersecurity Program. You will be part of a team managing NIST RMF Special Publications activities, providing ISSO and security assessment services for customer information systems. This remote position involves developing functional and technical requirements, preparing reports, coordinating security program elements, and managing security controls. You will build security into system development, support system owners, and adhere to continuous monitoring practices. The role also includes security assessments, ATO documentation, risk assessment, and assisting with contingency plans. You will audit and monitor logs, manage patch management, and support security awareness training.
Requirements
- Public Trust
- 5-8 years direct experience supporting federal organizations Cybersecurity programs as an ISSO
- Experience drafting FISMA related artifacts to include: system security plans, incident response plans, configuration management plan, FIPS 199, digital identity risk assessments, security impact analysis, contingency plan, security assessment plans and reports, Plan of Action and Milestones (POA&M), and training materials
- Experience in applying NIST Special Publications to information systems
- Experience with performing information system continuous monitoring of security controls to ensure that they continue to be implemented correctly, operating as intended and producing the desired outcome with respect for meeting the security requirements
- Knowledge of cybersecurity tools such as: Tenable, Qualys, Governance Risk Compliance (GRC) tools (e.g. Xacta, eMass, or CSAM, etc.,)
- Experience participating in security assessments and/or audits
Responsibilities
- Develop functional and technical requirements; serve as a POC for Information Systems with security issues
- Prepare and update reports to ensure that the unit complies with mandated internal and external security reporting requirements, including Federal Information Security Modernization Act (FISMA) and Capital Planning
- Coordinate security program and system elements with the agency IT Program Managers by evaluating system environments for security requirements and controls including: IT Security Architecture, hardware, software, telecommunications, security trends, and associated threats and vulnerabilities
- Manage security controls to ensure confidentiality, integrity and availability of information
- Build security into the system development process and define security specifications to Support the acquisition of new systems
- Support System Owners or Program Officers on the review of system procurement requests to ensure that security has been considered and included
- Adhere to and implement system security controls that ensure the protection of Sensitive but Unclassified (SBU) information using authentication techniques, encryption, firewalls, and access controls
- Complete Security Assessments
- Assist in the Assessment and Authorization process
- Create and/or update the System Security Plans and other ATO documentation
- Serve as an advisor in risk assessments of all systems and mitigate vulnerabilities
- Adhere to Continuous Monitoring practices to ensure that security controls are maintained over the life of IT systems
- Assist the System Owner in the development, testing and maintenance of contingency plans, backup and storage procedures
- Document all procedures according to the organizations standards
- Audit and monitor application, system and security logs for security threats, vulnerabilities and suspicious activities; report suspicious activities to the agency Incident coordinator
- Monitor and coordinate patch management and scanning techniques for all unit systems; participate in identification and mitigation of all system vulnerabilities
- Support and facilitate the security awareness, training, and education program; and
- Assist the Information System Security Manager (ISSM), or CISO in any other security related duties, as required
Preferred Qualifications
- Experience with conducting security assessments, audits, and control implementation in accordance with NIST Special Publications
- DoD 8570 IAM Level 2
- CIPP certification
- CCSK certification (CSA Knowledge Center)
- CISM (ISAKA)
- GRC certification (ISC2)
Share this job:
Similar Remote Jobs
