Information Technology Coordinator

Job Level
Mid-level position
Job Category
Coordinator
Sector
  • Technology
Job Status
Areas of Responsibility
  • Information Technology

Purpose

The Alternate Information Systems Security Manger is responsible for classified IS compliance by designing/executing an Information Assurance security program.

Essential Functions

Categorize the Information System and document results in the SSP. Describe the information system (including system boundary) and document the description in the SSP. Register the IS with the appropriate organizational program management offices. Identify security controls provided by the organization as common controls for organizational IS and document in the SSP. Select security controls for IS and document in SSP. Develop Continuous Monitoring strategy of security control effectiveness and any proposed/actual changes to IS and operational environment. Review and approve draft SSP. Implement the security controls specified in the SSP. Document the security control implementation, as appropriate in the SSP, providing a functional description of the control implementation. Develop/review/approve security control assessment plan. Assess controls in accordance with plan. Prepare SAR documenting assessment issues/ findings/recommendations. Conduct initial remedial actions on security controls based on findings/recommendations of SAR. Reassess remediated controls. Prepare the Plan of Action and Milestones (POA and M) based on the findings and recommendations of the SAR. Assemble the Security Authorization Package submit the package to AO for adjudication. Determine the risk to organizational operations. Determine if risk to is acceptable. Prepare (POA and M) based on findings/recommendations of SAR. Assemble the Security Authorization Package and submit package to AO. Conduct remediation actions. Update SSP, SAR, and (POA and M). Report the security status of the IS. Review the reported security status of the IS. Implement IS Decommissioning Strategy when needed.

Marginal/Incidental functions

Serving as a voting member of the Configuration Control Board (CCB)as needed by the ISSM. In extreme/emergency circumstances AISSM will/can support IS related security training/briefings for the security office. Other related functions as assigned.

Required qualifications

HS/GED. 6 yrs dem ability w/info assurance in National Security computing environment. 3 yrs w/Risk Mgmt Framework methodology. Dem ability supporting various system configurations; auditing/certifying security aspects of various operating systems/networks. Strong communication, critical thinking, problem solving skills; Self-motivated w/ability to effectively prioritize multiple projects. U.S. Citizen. Applicant selected will be subject to government security investigation and must meet eligibility requirements for access to classified info at the level appropriate to the project requirements of the position. Employment is contingent on selected applicant submitting application for access and receiving notification of eligibility w/in time-period specified in the job offer. Employment must begin w/in 30 days of confirmation of eligibility. Eligibility for access to classified information must continue w/out interruption during employment. Employment will be contingent on selected applicant obtaining a DoDM 8570.01 compliant certification, equivalent to IAT Level II w/in 6 mos. of start date. Continued compliant certification, equiv to IAT Level II is required during employment. Equivalent combination of relevant education and experience may be substituted as appropriate.

Preferred Qualifications

Bachelor's Degree: Computer Science, Information Systems Management, or related field. Eligibility for immediate access to classified information at the level appropriate to the project requirements of the position. Three years of experience in information assurance in a National Security computing environment. Two years experience with the Risk Management Framework methodology. Experience with policy creation and documentation preparation and maintenance. Windows Operating System and Linux Operating System certifications. Possess a current DoDM 8570.01 compliant certification, equivalent to Information Assurance Technical (IAT) Level II (i.e. Security+).

Working conditions

May work around standard office conditions Repetitive use of a keyboard at a workstation Use of manual dexterity Some weekend, evening and holiday work. Frequent use of manuals and books. May work in shared, windowless office space. Possible intrastate/interstate travel.

A criminal history background check will be required for finalist(s) under consideration for this position.

The retirement plan for this position is Teacher Retirement System of Texas (TRS), subject to the position being at least 20 hours per week and at least 135 days in length.

The University of Texas at Austin, as an equal opportunity/affirmative action employer, complies with all applicable federal and state laws regarding nondiscrimination and affirmative action. The University is committed to a policy of equal opportunity for all persons and does not discriminate on the basis of race, color, national origin, age, marital status, sex, sexual orientation, gender identity, gender expression, disability, religion, or veteran status in employment, educational programs and activities, and admissions. 

If hired, you will be required to complete the federal Employment Eligibility Verification form, I-9. You will be required to present acceptable, original documents to prove your identity and authorization to work in the United States. Information from the documents will be submitted to the federal E-Verify system for verification. Documents must be presented no later than the third day of employment. Failure to do so will result in dismissal.