About the Role
The contractor shall support CBP/OPR/CI in a wide range of systems engineering, administration, and Cyber security & regulatory compliance services necessary to maintain and secure OPR information technology networks used in the detection and investigations of cybercrimes and CBP policy violations.
The contractor shall provide a qualified individual(s) to serve as an Information Systems Security Officer (ISSO) providing cyber security oversight for several major OPR applications and general support systems as assigned by the Government Information Systems Security Manager. The contractor ISSO must be an acknowledged expert concerning current Federal, National, DHS and CBP standards, policies, requirements and procedures and shall provide technical security expertise in planning, coordinating, preparing and authoring security authorization documentation necessary to ensure OPR meets all Federal Information Systems Modernization Act (FISMA) regulatory requirements and DHS 4300-A Sensitive Systems Policy and CBP 1400-05D Information Security Policy.
The ISSO will manage the overall security related policies, procedures, laws and regulations; create, document and implement various security plans and compliance documents to enforce Information Assurance principles. In attaining this goal, the contractor shall support the Government Information Systems Security Manager by performing the following duties:
· Develop, draft, review and endorse all information systems security plans and other security authorization artifacts and documents such as:
· Standards for Security Categorization of Federal Information and Information Systems (FIPS 199) Assessment
· E-Authentication Determination
· Privacy Threshold Determination
· Privacy Impact Assessment (PIA)
· Risk Assessment Plans
· System Security Plans
· Controls Testing (Security Test and Evaluation (ST&E)) Plans
· Configuration/Change Management Plans
· Contingency Plans
· Contingency Plan Test and Test Results
· Section 508 of the Rehabilitation Act plans
· Plans of Actions & Milestones (POA&Ms)
· Policy waiver and risk acceptance requests
· Ensure that assigned systems are operated, maintained, and disposed of in accordance with applicable policies and procedures NIST SP 800-37, Rev 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, DHS 4300A Policy and Handbook, CBP Information Systems Security Policies and Procedures Handbook (HB 1400-05), and internal CBP (i.e., Office of Information Technology, Security Operations Division, etc.) security policies and practices
· Develop, review, maintain, and provide system security documentation for assigned systems, including System Security Plans, Interconnection Security Agreements, Contingency Plans, Plans of Action and Milestones, (POA&M), Waivers, and Exceptions through the DHS FISMA system management tool in use to implement and manage the NIST Risk Management Framework.
· Complete all activities required by the DHS Ongoing Authorization (OA) Program to transition assigned systems into the DHS OA Program and perform all required actions to maintain system authorization under OA once the system is admitted to the Program
· Assist the Government with the reporting and management of system level security violations and incidents.
· Assist the Government with the technical security evaluation of threats and vulnerabilities involving new/enhanced technology.
· Assist the Government with providing oversight to vulnerability scanning processes and procedures.
· Assist the Government with providing oversight to security patch management/flaw remediation processes and procedures.
· Assist with development of cyber security SOPs, playbooks, work instructions, and other procedures and processes to mature cyber security capabilities.
Requirements
Clearance: All CBP SOC employees are required to successfully complete a CBP Background Investigation to support this program
Candidates shall possess and maintain one of the following professional certifications:
· CompTIA Certified Advanced Security Practitioner (CASP+)
· ISC2 Certified Authorization Professional (CAP)
· ISC2 Certified Cloud Security Professional (CCSP) certification (The following certification is highly desired, but not required.)
· ISACA Certified Information Systems Auditor (CISA)
Basic Qualifications:
· Minimum of 5 years of experience as an ISSO supporting major federal information systems/applications
· Bachelor's degree in computer science, IT, Information/Cyber Security field from an accredited college or university
· Knowledge with auditing security controls and financial processes
· Superior writing, communication and critical analysis skills
· Deep understanding of Information Assurance, Information Technology and Information Management concepts, processes and procedures
· Working knowledge of the following policies: NIST SP 800-37, Rev 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, DHS 4300A Policy and Handbook, CBP Information Systems Security Policies and Procedures Handbook (HB 1400-05),
Preferred Qualifications:
• ISC2 Certified Authorization Professional (CAP) or ISC2 Certified Cloud Security Professional (CCSP) certification or CompTIA Certified Advanced Security
Education
A minimum of a Bachelor’s degree coupled with 8 - 12 years’ experience in the Information Technology arena or Master's Degree with 6+ years of relevant experience.