Today
Top Secret/SCI
Senior Level Career (10+ yrs experience)
Occasional travel
Security
Arlington, VA (On-Site/Office)
Gemini Industries Inc. provides technical, management and operations services to support National Security projects. We provide rapid response to the critical needs of our customers and those they serve. We perform analyses and develop operations plans to anticipate and prepare for the future. And we deliver advanced technology to improve our customer’s success in executing its mission.
Gemini seeks innovative, results-oriented individuals with the creativity, initiative, and intelligence to overcome any challenge and succeed. Members of the Gemini team thrive in a culture that is anticipatory, agile, and schedule-driven; with a sense of urgency and a drive to succeed. Our culture involves:
• The best and brightest personnel
• Work at a high operations tempo
• Integrated teams delivering rapid solutions.
• An attitude that balances “I can make it better” with “As long as we succeed.”
Senior Information Systems Security Officer
Location: Arlington, VA (Pentagon) On site
Clearance: TS/SCI
Education: MA/MS (or BA/BS plus an additional 4 years of related work experience)
Outcomes:
The successful candidate is expected to accomplish the following outcomes in the first year on the position:
•Formally track all tasks, to include assigned by, suspense, status, and comments on all assigned tasks through completion and be prepared to brief upon request.
•Develop digital continuity folders and files that include standard operating procedures, workflows and POC lists to accomplish all tasks.
•Create 2-3 products beyond the client’s requirements that positively impact the client to either increase efficiency, effectiveness, or innovation.
•Master position tasks within 60 days and exceed requirements within 90 days.
Responsibilities:
The Sr. Information Systems Security Officer (ISSO) supports cybersecurity and Information Assurance (IA) related processes for the Secretary of the Air Force – Security, Special Program Oversight, and Information Protection Directorate (SAF/AAZ), to include support to the AAZ Information System Security Manager (ISSM). Per sections 1.3.4.1 and 1.3.9.1, specific responsibilities and tasks include but are not limited to:
Specific responsibilities include but are not limited to:
•Assist with coordination of cybersecurity related processes and activities for AAZ Information Systems and related interfaces. The processes include: bare not limited to, Risk Management Framework (RMF) and system authorization, Cyber Incident Handling, System Life Cycle Management Processes (e.g. Engineering Change and Configuration Management), Vulnerability Management, Malware Protection, Security Assessments/Evaluations/Reviews, Continuous Monitoring, Department of Defense Informaton Network (DODIN) Connection Approval Process, and Cybersecurity Service Provider (CSSP).
•Coordinate, oversee, and track DoD IT systems network establishment used within SAF/AAZ, procurement, installation, and maintenance at several office locations within the NCR. This includes working with JSP, NCR AF Communications Support Commands, DoD sponsoring organizations, SAF/AQ, AF/A2/6, AFDW SSO, 11 WG IP and SAF/AAZ IT and Security staff to determine IT requirements for office space / daily operational needs.
•Assist with production of documentation to support cybersecurity assessments, security impact analysis and system authorization of AAZ information Systems per ISSM guidance.
•Assist with maintaining an Information Assurance Program and ensure compliance with DODO 8510.01 – Risk Management Framework (RMF) for DOD IT.
• Develop system security and information assurance documentation consistent with the standards above to support system assessment and authorization, as well as interim authority and authority to operate decisions (RR #33).
•Review, analyze, and assess systems configuration/architectures to identify security, safety, and mission-critical functions/components and Critical Program Information (CPI) (RR#32).
•Ensure policy, plans, procedures are followed to include proper incident characterization and categorization.
•Implement and enforce all DoD information system IA policies and procedures, as defined by its security certification and accreditation documentation.
•Ensure all users have the requisite security clearances and supervisory need-to-know authorization and are aware of their IA responsibilities before being granted access to any DoD information system.
•Conduct annual self-inspections IAW the Site ISSM and the NCR CISO procedures.
•Develop and maintain corrective solutions and associated documentation and reports.
•Maintain day-to-day security posture and continuous monitoring of Information Security.
•Assist the Government IT Office by providing engineering, technical, and management consultant support for AAZ requirements.
•Ensure upgrade/modifications of IT software are stable and backup is maintained.
•Coordinate to repair, restore and install communications security hardware and measures IAW SAF/AAZ requirements.
•Provide IT hardware support:
o Provide technical engineering and programmatic support through requirements definition, design, identifications, implementation, equipment selection recommendations, installation, integration, test, and acceptance.
o Provide and maintain hardware/network documentation generated as a result of or used in the performance of this task.
•Interface with the NIPRNET, SIPRNET, JWICS, Defense Messaging System, and other networks as required (to include SAP networks).
•Analyze, implement, and document procedures to protect the systems integrity:
o Implement data ownership/data classification programs.
o Develop disaster recovery plans (Section F.3, Deliverable 38).
•Provide technical advice and guidance on AAZ systems to support the Information Systems Security Engineer (ISSE) across classified, unclassified, and cloud-based networks and related systems, workstations, and associated software applications.
•Prepare briefings, attend meetings, and assist with responses.
Qualifications:
The candidate must have the following qualifications:
•Minimum of ten (10) years’ experience initiating and evaluating system security and information assurance requirements and developing system security and IA documentation.
•Minimum of six (6) of those years of related work experience supporting a DoD Component.
•Administrative knowledge and experience with Microsoft Windows server/desktop environments as well as an understanding of the Interface with the NIPRNET, SIPRNET, JWICS, Defense Messaging System, and other networks (to include SAP networks).
•Familiarity with NIST 800-53.
•Excellent MS Office Software (Outlook, Word, Excel and PowerPoint) skills.
•Strong organization and writing skills a must.
•Personnel shall be IAT Level II certified in accordance with DoD 8570.01-M.
The following qualifications are desired:
•Experience within a military component of the DoD
•Must be analytical, possess excellent communication and presentation skills and the ability to work independently in an ambiguous environment and as a member of a team.
Travel: Occasional local travel required.
Other Requirements:
We seek:
• Highly motivated self-starters
• Resourceful individuals with extraordinary intellectual capability and the ability to rapidly learn and apply new concepts.
• Individuals who have a “let me try” attitude and are resilient, present an opinion/position, justify it, and then accept whatever decision is made and charge forward.
• Individuals who view criticism as an opportunity to improve (“let me try again”)
• Individuals who think and create, enhancing the company with a steady flow of fresh ideas, perspective, and energy.
Direct Inquiries and Resumes to:
Andrew Ackley
Corporate Recruiter
Gemini Industries Inc.
1408 N. Westshore Blvd., Ste. 909
Tampa, FL
Telephone: (813) 286-4785
Jobs@gemini-ind.com
________________________________________
Gemini Industries Inc. is proud to be an Equal Opportunity / Affirmative Action Employer. We are committed to abiding by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities, and prohibit discrimination against all individuals based on their race, color, religion, sex, or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, national origin, protected veteran status or disability and any other basis protected by applicable law.
Gemini seeks innovative, results-oriented individuals with the creativity, initiative, and intelligence to overcome any challenge and succeed. Members of the Gemini team thrive in a culture that is anticipatory, agile, and schedule-driven; with a sense of urgency and a drive to succeed. Our culture involves:
• The best and brightest personnel
• Work at a high operations tempo
• Integrated teams delivering rapid solutions.
• An attitude that balances “I can make it better” with “As long as we succeed.”
Senior Information Systems Security Officer
Location: Arlington, VA (Pentagon) On site
Clearance: TS/SCI
Education: MA/MS (or BA/BS plus an additional 4 years of related work experience)
Outcomes:
The successful candidate is expected to accomplish the following outcomes in the first year on the position:
•Formally track all tasks, to include assigned by, suspense, status, and comments on all assigned tasks through completion and be prepared to brief upon request.
•Develop digital continuity folders and files that include standard operating procedures, workflows and POC lists to accomplish all tasks.
•Create 2-3 products beyond the client’s requirements that positively impact the client to either increase efficiency, effectiveness, or innovation.
•Master position tasks within 60 days and exceed requirements within 90 days.
Responsibilities:
The Sr. Information Systems Security Officer (ISSO) supports cybersecurity and Information Assurance (IA) related processes for the Secretary of the Air Force – Security, Special Program Oversight, and Information Protection Directorate (SAF/AAZ), to include support to the AAZ Information System Security Manager (ISSM). Per sections 1.3.4.1 and 1.3.9.1, specific responsibilities and tasks include but are not limited to:
Specific responsibilities include but are not limited to:
•Assist with coordination of cybersecurity related processes and activities for AAZ Information Systems and related interfaces. The processes include: bare not limited to, Risk Management Framework (RMF) and system authorization, Cyber Incident Handling, System Life Cycle Management Processes (e.g. Engineering Change and Configuration Management), Vulnerability Management, Malware Protection, Security Assessments/Evaluations/Reviews, Continuous Monitoring, Department of Defense Informaton Network (DODIN) Connection Approval Process, and Cybersecurity Service Provider (CSSP).
•Coordinate, oversee, and track DoD IT systems network establishment used within SAF/AAZ, procurement, installation, and maintenance at several office locations within the NCR. This includes working with JSP, NCR AF Communications Support Commands, DoD sponsoring organizations, SAF/AQ, AF/A2/6, AFDW SSO, 11 WG IP and SAF/AAZ IT and Security staff to determine IT requirements for office space / daily operational needs.
•Assist with production of documentation to support cybersecurity assessments, security impact analysis and system authorization of AAZ information Systems per ISSM guidance.
•Assist with maintaining an Information Assurance Program and ensure compliance with DODO 8510.01 – Risk Management Framework (RMF) for DOD IT.
• Develop system security and information assurance documentation consistent with the standards above to support system assessment and authorization, as well as interim authority and authority to operate decisions (RR #33).
•Review, analyze, and assess systems configuration/architectures to identify security, safety, and mission-critical functions/components and Critical Program Information (CPI) (RR#32).
•Ensure policy, plans, procedures are followed to include proper incident characterization and categorization.
•Implement and enforce all DoD information system IA policies and procedures, as defined by its security certification and accreditation documentation.
•Ensure all users have the requisite security clearances and supervisory need-to-know authorization and are aware of their IA responsibilities before being granted access to any DoD information system.
•Conduct annual self-inspections IAW the Site ISSM and the NCR CISO procedures.
•Develop and maintain corrective solutions and associated documentation and reports.
•Maintain day-to-day security posture and continuous monitoring of Information Security.
•Assist the Government IT Office by providing engineering, technical, and management consultant support for AAZ requirements.
•Ensure upgrade/modifications of IT software are stable and backup is maintained.
•Coordinate to repair, restore and install communications security hardware and measures IAW SAF/AAZ requirements.
•Provide IT hardware support:
o Provide technical engineering and programmatic support through requirements definition, design, identifications, implementation, equipment selection recommendations, installation, integration, test, and acceptance.
o Provide and maintain hardware/network documentation generated as a result of or used in the performance of this task.
•Interface with the NIPRNET, SIPRNET, JWICS, Defense Messaging System, and other networks as required (to include SAP networks).
•Analyze, implement, and document procedures to protect the systems integrity:
o Implement data ownership/data classification programs.
o Develop disaster recovery plans (Section F.3, Deliverable 38).
•Provide technical advice and guidance on AAZ systems to support the Information Systems Security Engineer (ISSE) across classified, unclassified, and cloud-based networks and related systems, workstations, and associated software applications.
•Prepare briefings, attend meetings, and assist with responses.
Qualifications:
The candidate must have the following qualifications:
•Minimum of ten (10) years’ experience initiating and evaluating system security and information assurance requirements and developing system security and IA documentation.
•Minimum of six (6) of those years of related work experience supporting a DoD Component.
•Administrative knowledge and experience with Microsoft Windows server/desktop environments as well as an understanding of the Interface with the NIPRNET, SIPRNET, JWICS, Defense Messaging System, and other networks (to include SAP networks).
•Familiarity with NIST 800-53.
•Excellent MS Office Software (Outlook, Word, Excel and PowerPoint) skills.
•Strong organization and writing skills a must.
•Personnel shall be IAT Level II certified in accordance with DoD 8570.01-M.
The following qualifications are desired:
•Experience within a military component of the DoD
•Must be analytical, possess excellent communication and presentation skills and the ability to work independently in an ambiguous environment and as a member of a team.
Travel: Occasional local travel required.
Other Requirements:
We seek:
• Highly motivated self-starters
• Resourceful individuals with extraordinary intellectual capability and the ability to rapidly learn and apply new concepts.
• Individuals who have a “let me try” attitude and are resilient, present an opinion/position, justify it, and then accept whatever decision is made and charge forward.
• Individuals who view criticism as an opportunity to improve (“let me try again”)
• Individuals who think and create, enhancing the company with a steady flow of fresh ideas, perspective, and energy.
Direct Inquiries and Resumes to:
Andrew Ackley
Corporate Recruiter
Gemini Industries Inc.
1408 N. Westshore Blvd., Ste. 909
Tampa, FL
Telephone: (813) 286-4785
Jobs@gemini-ind.com
________________________________________
Gemini Industries Inc. is proud to be an Equal Opportunity / Affirmative Action Employer. We are committed to abiding by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities, and prohibit discrimination against all individuals based on their race, color, religion, sex, or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, national origin, protected veteran status or disability and any other basis protected by applicable law.
group id: 10125610