Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Information Systems Security Officer Top Secret Clearance Req'd.
United States Jobs Expertini

Urgent! Information Systems Security Officer - Top Secret Clearance Req'd Job Opening In Nellis Air Force Base – Now Hiring Diligent Consulting Inc

Information Systems Security Officer Top Secret Clearance Req'd



Job description

ACTIVE TOP SECRET CLEARANCE REQUIRED Information System Security Officer (ISSO)/Technical Security Requirements.


The contractor shall perform the following duties related to Information Assurance/Technical Security IAW DoD JSIG and applicable DoD, DAF, ACC, and Wing applicable AIS security polices and regulations:



  • - Manage, update, and accomplish AIS RMF BOE and BOE associated requirements.

  • Ensure development and implementation of procedures IAW Configuration Management policies and procedures for evaluation of AIS security program.

    - Perform analysis of network security, based upon RMF JSIG, National Industrial Security Program Operating Manual (NISPOM) Chapter 8, and other sources as added or updated, advise customers on AIS certification and accreditation issues.

    - Perform AIS risk assessments and make recommendations to customers, Wing Information System Security Manager (ISSM), and System Owner.

    - Participation in AIS Configuration Control Board.

    - Advise Wing ISSM and System Owner on security testing methodologies and processes.

    - Evaluate AIS certification documentation and provide written recommendations for accreditation to Wing ISSM and System Owner.

    - Review AIS security to accommodate and/or recommend changes to policy or technology.

    - Evaluate Information Technology (IT) threats and vulnerabilities to determine whether additional safeguards are needed and report these threats or vulnerabilities to Wing ISSM and System Owner.

    - Develop and maintain a formal Information Systems Security Program.

    - Recommend changes/updates to the Wing Information Assurance Standard Operating Procedure (IA SOP) to the Wing ISSM when applicable to support unique AIS requirements.

    - Review and evaluate all certification/accreditation support documentation for proof of acceptable AIS and network security procedures and based upon review, provide written documentation for accreditation to the Wing ISSM, to include External Information Systems (EIS).

    - Ensure all personnel have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to AIS.

    - Ensure approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output.

    - Ensure all accreditation documentation, to include Cyber Program required documentation is loaded to Core File Share IAW Wing IA SOP.

    - Conduct and coordinate AIS security inspections, tests, and reviews.

    - Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within the applicable computer or network system.

    - Ensure that data ownership and responsibilities are established for each AIS, to include accountability, access rights, and special handling requirements.

    - Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting AIS security training.
  • Manage Media Custodian Training, User Account Training, Annual SAP Security Training, and Data Transfer Training.

    - Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed.
  • Manage, track, and install AIS vulnerability patches.

    - Assess configuration changes in the system, environment, and operational needs that could affect AIS accreditation.

    - Review existing security documentation to verify documents still accurately represent the system; a re-evaluation of the system vulnerabilities, threat and risk; and complete security test, or subset of the original test that will be conducted.

    - Conduct periodic testing of the security posture of the information systems as required.
  • Verify the compliance of the system with the security requirements by demonstrating, inspecting, and analyzing the system’s capabilities and base-line configuration.

    - Ensure configuration management for security-relevant AIS software, hardware, and firmware is maintained and documented.

    - Ensure system recovery processes are monitored to ensure security features and procedures are properly restored.

    - Ensure all AIS security-related documentation is current and accessible to authorized individuals.

    - Ensure system security requirements are addressed during all phases of the system life cycle.
  • Develop and manage an AIS End of Support (EOS) program for all AIS and associated equipment/devices.
  • Advise customer on upcoming costs associated with replacing EOS equipment for effective budget.

    1.2.1.27.
  • Perform weekly system audits as required on multiple systems; work closely with system administrators and ensure current security measures are sufficient and in compliance with approved policies and processes.

    -Perform account management for all systems and access; tasks include verifying requirements for access and adding/modifying/deleting accounts as required.

    - Write Request for Approvals (RFA) for equipment and electronic data being used in off-site locations.

    - Participate in annual self-inspections and Command Compliance Inspections; identify discrepancies and report security incidents as required by the DAA and/or Program Security Officer (PSO).

    - Maintain a working knowledge of system functions, security safeguards, and operational security measures.

    - Provide research and analysis in support of expanding programs and areas of responsibility.

    - Manage Media Control Program to include accountability of magnetic and optical media of all types.

    - Perform virus and malicious code scanning on all computer media entering the facility.

    - Perform file transfers between local systems to storage devices.

    - Manage the disposition and destruction of AIS, at all classification levels, and supported devices/peripherals IAW DoD policies.

    - Inspect incoming equipment to ensure what was ordered; inspect outgoing equipment for classified markings and for any non-volatile storage devices.

      Powered by JazzHR

  • Required Skill Profession

    Computer Occupations



Your Complete Job Search Toolkit

✨ Smart • Intelligent • Private • Secure

Start Using Our Tools

Join thousands of professionals who've advanced their careers with our platform

Rate or Report This Job
If you feel this job is inaccurate or spam kindly report to us using below form.
Please Note: This is NOT a job application form.


    Unlock Your Information Systems Potential: Insight & Career Growth Guide


  • Real-time Information Systems Jobs Trends in Nellis Air Force Base, United States (Graphical Representation)

    Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for Information Systems in Nellis Air Force Base, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 35442 jobs in United States and 126 jobs in Nellis Air Force Base. This comprehensive analysis highlights market share and opportunities for professionals in Information Systems roles. These dynamic trends provide a better understanding of the job market landscape in these regions.

  • Are You Looking for Information Systems Security Officer Top Secret Clearance Req'd Job?

    Great news! is currently hiring and seeking a Information Systems Security Officer Top Secret Clearance Req'd to join their team. Feel free to download the job details.

    Wait no longer! Are you also interested in exploring similar jobs? Search now: .

  • The Work Culture

    An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at Diligent Consulting Inc adheres to the cultural norms as outlined by Expertini.

    The fundamental ethical values are:
    • 1. Independence
    • 2. Loyalty
    • 3. Impartiality
    • 4. Integrity
    • 5. Accountability
    • 6. Respect for human rights
    • 7. Obeying United States laws and regulations
  • What Is the Average Salary Range for Information Systems Security Officer Top Secret Clearance Req'd Positions?

    The average salary range for a varies, but the pay scale is rated "Standard" in Nellis Air Force Base. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.

  • What Are the Key Qualifications for Information Systems Security Officer Top Secret Clearance Req'd?

    Key qualifications for Information Systems Security Officer Top Secret Clearance Req'd typically include Computer Occupations and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.

  • How Can I Improve My Chances of Getting Hired for Information Systems Security Officer Top Secret Clearance Req'd?

    To improve your chances of getting hired for Information Systems Security Officer Top Secret Clearance Req'd, consider enhancing your skills. Check your CV/Résumé Score with our free Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.

  • Interview Tips for Information Systems Security Officer Top Secret Clearance Req'd Job Success
    Diligent Consulting Inc interview tips for Information Systems Security Officer   Top Secret Clearance Req'd

    Here are some tips to help you prepare for and ace your job interview:

    Before the Interview:
    • Research: Learn about the Diligent Consulting Inc's mission, values, products, and the specific job requirements and get further information about
    • Other Openings
    • Practice: Prepare answers to common interview questions and rehearse using the STAR method (Situation, Task, Action, Result) to showcase your skills and experiences.
    • Dress Professionally: Choose attire appropriate for the company culture.
    • Prepare Questions: Show your interest by having thoughtful questions for the interviewer.
    • Plan Your Commute: Allow ample time to arrive on time and avoid feeling rushed.
    During the Interview:
    • Be Punctual: Arrive on time to demonstrate professionalism and respect.
    • Make a Great First Impression: Greet the interviewer with a handshake, smile, and eye contact.
    • Confidence and Enthusiasm: Project a positive attitude and show your genuine interest in the opportunity.
    • Answer Thoughtfully: Listen carefully, take a moment to formulate clear and concise responses. Highlight relevant skills and experiences using the STAR method.
    • Ask Prepared Questions: Demonstrate curiosity and engagement with the role and company.
    • Follow Up: Send a thank-you email to the interviewer within 24 hours.
    Additional Tips:
    • Be Yourself: Let your personality shine through while maintaining professionalism.
    • Be Honest: Don't exaggerate your skills or experience.
    • Be Positive: Focus on your strengths and accomplishments.
    • Body Language: Maintain good posture, avoid fidgeting, and make eye contact.
    • Turn Off Phone: Avoid distractions during the interview.
    Final Thought:

    To prepare for your Information Systems Security Officer Top Secret Clearance Req'd interview at Diligent Consulting Inc, research the company, understand the job requirements, and practice common interview questions.

    Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the Diligent Consulting Inc's products or services and be prepared to discuss how you can contribute to their success.

    By following these tips, you can increase your chances of making a positive impression and landing the job!

  • How to Set Up Job Alerts for Information Systems Security Officer Top Secret Clearance Req'd Positions

    Setting up job alerts for Information Systems Security Officer Top Secret Clearance Req'd is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!