ISSE/ISSO

Perform or review technical security assessments of computing environment to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies.  Validate and verify system security requirements definitions and analysis and establish system security designs.  Design develop, implement and/or integrate IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements.  Builds IA into systems deployed to operational environments.  Assist architects and system developers in the identification and implementation of appropriate information security functionality to ensure uniform application of security policy and enterprise solutions.  Assess and mitigate system security threats/risk throughout the program life cycle.

TS/SCI with polygraph required. 

HR TEAM