Information systems security officers (ISSO) research, develop, implement, test and review TSA’s information security in order to protect information and prevent unauthorized access. ISSO will inform users about security measures, explain potential threats, install software, implement security measures and monitor networks. The ISSO will plan, implement, upgrade, and monitor security measures for the protection of computer networks and information. They may also ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. ISSO will respond to computer security breaches and viruses.
- Security Categorization
- Information System Descriptions and Registrations
- Common Security Control ID and Selection
- Monitoring Strategy
- Security Plan and Security Plan Approval Recommendations
- Implement Security Controls; Documentation, Monitoring
- Compliance and Authorization Services; FISMA Inventory and CPIC
- Business Impact Analysis, Contingency Plan, Contingency Plan Test Results
- Interconnection Security Agreements (ISA)
- Decommissioning and Disposal
- Develop System Level Incident Response (IR) Procedures
- Ensure that management, operational, and technical controls for securing either National Security Systems or SBU level Information Systems are in place and are followed. This includes ensuring that appropriate steps are taken to implement information security requirements for IT systems throughout their life cycle. Conduct Security Authorization (SA) activities in accordance with NIST 800.37 standards. All S&A deliverables must meet the metrics in the DHS Information Security Performance Plan.
- Report IT Security events/incidents in the time prescribed by DHS 4300 Sensitive Systems Policy Directive depending on the severity of the incident.
- Respond to Information Security Vulnerability Management (ISVM) notifications and ensure all systems under their purview are in compliance with the ISVM by the date prescribed by DHS.