Scientific Research Corporation Job - 35282774 | CareerArc
  Search for More Jobs
Get alerts for jobs like this Get jobs like this tweeted to you
Company: Scientific Research Corporation
Location: North Charleston, SC
Career Level: Entry Level
Industries: Manufacturing, Engineering, Aerospace



The SRC Navy Cryptologic Systems (NCS) Directorate supports a number of US Navy Programs, including the Cryptologic Carry-On Program (CCOP), Ships' Signals Exploitation Equipment (SSEE) Program, and Distributed Common Ground System -- Navy (DCGS-N). We specialize in engineering support, software development, integration, testing, technical writing, Cybersecurity (administration, policy and engineering), production, technical support, warehousing, drafting, repair and management.
As an NCS Information Systems Security Officer (ISSO), this position is responsible for supporting the information system owner to complete security assessment, continuous monitoring, and configuration management responsibilities of NCS. Responsibilities include, but are not limited to:
  • Perform monthly compliance assessments using tools, such as Assured Compliance Assessment Solution (ACAS), Collaborative Computing Security Services (CS2) audit files, Secure Content Automation Protocol (SCAP), and McAfee Virus Scan Enterprise. Review, document, and maintain all results
  • Verifying patches and virus definitions to the systems using existing automated tools
  • Adhering to pre-defined configuration management and change management policies and procedures for
    authorizing software prior to its implementation on systems
  • Ensuring that audit trails (system logs) are reviewed as required. Audit records will be maintained for future
  • Assessing NCS Family of Systems in accordance with NIST, NSA and NAVINTEL IA guidance
  • Recommending authorization of systems to the Designated Authorizing Official (DAO) as a certified
    Trusted Agent
  • Reporting security incidents in accordance with the Command's Incident Response Plan
  • Ensuring systems are operated, used, maintained, and disposed of in accordance with all applicable security policies and practices

 Apply on company website