Separation of duties is an important security best practice. Separation of duties (SoD) is where an organization creates different roles for very important tasks. For example, a system administrator should not have the role of an auditor. The reason you separate these roles is because there is a conflict of interest where the system administrator auditing their own system will not be able to be completely objective when performing an assessment.
As an ISSO you are not Atlas holding up the the security of the entire organization. Instead you are part of a larger process. The risk management process and the organization as a whole abides by the process so the risk is managed by all. It is very stressful to try to take on all the responsibility and risk of the entire organization. It is also impossible for one person to absorb all that risk and run a successful organization with a great degree of confidence. The ISSO must be apart of the team and support the team.
checkout the courses:
Title: Information System Security Officer (#ISSO)
Location : Washington, DC
Duration : Full time
Active Clearance required.
The contractor shall assist the government in the assessment process for all new and legacy systems to determine the security requirements associated with each system. The contractor shall interact with both technical and non-technical personnel in order to conduct a comprehensive review of a system, network or application. This is a technical role requiring moderate to advanced knowledge of security engineering, the #ATO process, enterprise monitoring, and incident response. The contractor shall assist in building or refining the program to achieve the assessment process. The contractor shall work with various elements of the cybersecurity team to understand roles, missions and requirements in order to inform this process.
Minimum Qualifications and Experience
At least 3 years serving as an Information Systems Security Officer (ISSO) at a cleared facility.
Minimum of 5 years work experience in a computer science- or Information Assurance-related field.
At least one of the following certifications: Certified Information Systems Security Professional (#CISSP), Global Information Security Professional (#GISP), or the CompTIA Advanced Security Practitioner (#CASP) or other certifications exemplifying skill sets such as those described in DoD Instruction #8570.1 IAM Level III proficiency.
Familiarity with the use and operation of security tools including Tenable. Nessus and/or SecurityCenter, IBM Guardium, Client Weblnspect, or like applications and Network Mapper (#NMAP).
A bachelor’s or advanced degree in Computer Science, Information Assurance, or Engineering is preferred.
Please provide the following information
Alternate contact (if any):
Kindly share your detailed resume at email@example.com
If you are qualified and interested in making a change or know of a friend who might have the required qualifications, please call me ASAP at (703) 261-7028 Ext.267, even if we have spoken recently about a different position. If you do respond via e-mail please include a daytime phone number so I can reach you. In considering candidates, time is of the essence, so please respond ASAP. Thank you.
8251 Greensboro Drive, Suite 250
(703) 261-7028 Ext.267
Check out my FREE courses at: https://securitycompliance.thinkific.com
In this video we read some of your questions about getting IT Security Jobs.
“I have a B.A in Telecommunications, would this work for this career field.” see the answer at 00:00:45
“Hey Bruce I got my security + and cap. What do you suggest on how to get into the risk management/ security auditing field when someone doesn’t have any experience? I do have 7 years experience in desktop support and data center monitoring just want to try a different field but not sure how to go about this.”
answer at 00:02:53
“What training is need to get into the security field? I have a BS in information security and working a MS in Cybersecurity and working on getting my CEH cert. What are ways that I can get into the security field as I don’t have any security experience and most jobs postings are wanting at least 4 to 5 years of experience”
answer at 00:06:26
There are hundreds of different roles & responsibilities in the IT Security career field alone. Here are some of the common types that I have seen:
Information System Security Manager – coordinate with the system owner and the information system security officer to ensure security is on the systems.
Information System Security Officer – coordinate with management and system administrators to implement system security controls. Ensures security controls are tracked and documented.
System Administrator – applies technical functionality and security on information systems.
Architect – assists in the design of enterprise information systems.
Security Analyst – review the logs of information systems to determine if there are any malicious activities happening.
Auditors – review the information systems to make sure the security controls are applied, documented and continuously monitored.
So you want to get into Information Technology? Well what do you want to do in IT because there are many different branches of it. I would suggest going into IT security, specifically, Risk Management Framework. It is a very specialized field.
You will need to know the fundamental of IT security. The basics on what goes into securing important data and their hardware. You will also need to have at least a little knowledge of technology and its history. You will need to know a LOT about NIST SP 800-37, “Guide for Applying the Risk Management Framework to Federal Information Systems”. You will need to dive into NIST SP 800-53, “Security and Privacy Controls for Federal Information Systems and Organizations”.
Since not many people want to do this work, or even know about it, there is not much competition. They are always looking for qualified people to do it. What you will need is a 4 year degree (preferably in something technical), an IT certification in security (Security+, ISC2 CAP, CISSP, CASP, CISM,CISA) and a lot of knowledge on NIST 800-37.