Broadleaf, Inc
Information Systems Security Officer (Journeyman) (Information Technology)
What is an NHO?
Native Hawaiian Organization or NHO is a community service organization serving Native Hawaiians in the State of Hawaii which is a not-for-profit organization chartered by the State of Hawaii, is controlled by Native Hawaiians, and whose business activities will principally benefit such Native Hawaiians.
Our NHO's Mission
NHO is a non-profit organization designed to benefit the Hawaii people through the development and advocacy of Science, Technology, Engineering and Math (STEM) education and by promoting Hawaii's role as America's Gateway to the Pacific.
Our NHO supports this missions through an agenda that facilitates community resilience, development, economic prosperity, and strengthens Hawaii's relationships with its Asia-Pacific neighbors.
Responsible for administering, assuring and maintaining a unique communication system network to allow secure communication of critical mission data. Responsible for ensuring appropriate operational security posture is maintained. Plays an active role in monitoring the system and its environment. Develops and updates the System Security Plan (SSP), managing and controlling changes to the system, A&A package and assessing the security impact of those changes. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and Authorizing Official (AO) risk mitigation statement prior to the change. Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package. Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Ensure all IS security-related documentation is current and accessible to properly authorized individuals. Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS. Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly. Ensure audit records are collected and reviewed. Working knowledge of Assured Compliance Assessment Solution (ACAS) vulnerability scanning software.
Job Description:
Certification Requirement:
Years' Experience Requirement:
Clearance Requirement:
Benefits:
EEO Employer F/M/Vet/Disabled