More jobs:
ARL Information Systems Security Officer; ISSO
Job in
Austin, Travis County, Texas, 78716, USA
Listed on 2026-01-12
Listing for:
University of Texas
Full Time
position Listed on 2026-01-12
Job specializations:
-
IT/Tech
Cybersecurity, Information Security
Job Description & How to Apply Below
** Job Posting
Title:
** ARL Information Systems Security Officer (ISSO)**---
- **** Hiring Department:
** Applied Research Laboratories**---
- **** Position Open To:
** All Applicants**---
- **** Weekly Scheduled
Hours:
** 40**---
- **** FLSA Status:
** Exempt**---
- **** Earliest
Start Date:
** Immediately**---
- **** Position Duration:
** Expected to Continue**---
- ***
* Location:
** PICKLE RESEARCH CAMPUS**---
- **** Job Details:**## Purpose Meeting ARL:
UT's Risk Management Framework requirements for National Security computing environments as defined by the National Institute of Standards and Technology 800-Series, Committee on National Security Systems Instructions, NISPOM Requirements, and the DCSA Assessment and Authorization Program Manual (DAAPM) and/or DCSA Assessment and Authorization Guide (DAAG).## Responsibilities
* Responsible for conducting the professional auditing of collateral classified Information Systems at the Applied Research Laboratories:
University of Texas at Austin (ARL), in order to maintain compliance with the DCSA Assessment and Authorization Guide (DAAG).
* Assist in conducting audit interviews and preparing interview notes, performing audit tests, and develop and monitor remediation plans for identified issues.
* Assist in verifying that Lab wide information security standards, policies, and practices are being followed, and closely coordinate with and provide training and guidance to others within the laboratory, on ensuring and maintaining the security posture of all information systems as well as implementing security control requirements.
* Responsible for assisting in the verification that classified information systems meet the Risk Management Framework requirements for National Security computing environments as defined by the National Institute of Standards and Technology 800-Series, and the Defense Counterintelligence and Security Agency Assessment and Authorization Guide.
* Other related functions as assigned.##
Required Qualifications
* HS/GED.
* Three years of experience with auditing various operating systems and networks.
* Technical experience in supporting security configurations of Windows/Linux operating systems.
* Strong communication, critical thinking, and problem-solving skills with the ability to prioritize projects..
* Relevant education and experience may be substituted as appropriate.
US Citizen. Applicant selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information at the level appropriate to the project requirements of the position. Employment is contingent on selected applicant submitting application for access and receiving notification of eligibility within a time period specified in the job offer. Employment must begin within 30 days of confirmation of eligibility.
Eligibility for access to classified information must continue without interruption during employment. Employment will be contingent on selected applicant obtaining a DoDM 8570.01 compliant certification, equivalent to IAT Level II within 6 months of start date. Continued compliant certification, equivalent to IAT Level II is required during employment.##
Preferred Qualifications
* Bachelor's Degree:
Computer Science, Information Systems Management, Cybersecurity, or related field.
* Eligibility for immediate access to classified information at the level appropriate to the project requirements of the position.
* Five years of experience in information security in a National Security computing environment.
* Three years of experience with the Risk Management Framework methodology. Windows Operating System and Linux Operating System certifications.
* Experience conducting security audits of information systems.
* SIEM Tool Experience (Arc Sight, Splunk, Wireshark, etc.).
* Experience with vulnerability/compliance scanning tools (ACAS/Nessus, Retina, MBSA, SCAP, etc.).
* Experience with the implementation of STIG/SRG compliance configurations.## General Notes An agency designated by the federal government handles the investigation as to the requirement for eligibility for access to classified information. Factors considered…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×