Job Description At BAE Systems, were dedicated to creating innovative solutions that make a real difference in peoples lives. As a leading global defense, security, and aerospace company, were committed to delivering cutting-edge technology that helps protect nations, secure infrastructure, and advance human exploration. Our team is driven by a passion for innovation, collaboration, and excellence, and were looking for talented professionals like you to join us.
Were seeking an experienced IT Security Specialist to join our team as a Senior Principal II. As an Information Systems Security Officer (ISSO), you will play a critical role in ensuring the security and integrity of our information systems. You will work closely with our security professionals to develop and implement strategies to detect and mitigate threats, protect critical data sets, and provide assessments of system and network vulnerabilities.
Primary Roles and Responsibilities:
- Provide support for implementing and enforcing information systems security policies, standards, and methodologies
- Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information
- Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation
- Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
- Evaluate security solutions to ensure they meet security requirements for processing information
- Maintain operational security posture for information systems
- Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system/program/enclave
- Develop and maintain documentation for Certification & Accreditation in accordance with specified policies
- Develop and update system security plans and other IA documentation
- Provide support for Information Assurance Vulnerability Alerts (IAVAs) management
- Provide Configuration Management for security-relevant information system software, hardware, and firmware
- Develop system security policy and ensure compliance
- Administer the user identification and authentication mechanisms of the Information System
LI-PB2