growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide support for a program, organization, system, or enclave's information assurance program. Provide support … for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide support for a program, organization, system, or enclave's information assurance program. Provide support … for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
We are currently recruiting for a Regional InformationSecurityOfficer , reporting to the Global Chief InformationSecurityOfficer (CISO), to oversee the informationsecurity function across the countries and Tunstall entities in their scope. This is an incredibly exciting time to join Tunstall as we embark on an exciting period of transformation. … You will be joining a recently created and growing global InformationSecurity team within Tunstall and will be in a leadership position playing a key part in the success of this transformation. This role would be based at either our Manchester office or our Whitley site (DN14 0HR) working on a hybrid basis. We are flexible on number … of days in the office. What will you be doing in this role? As our Regional SecurityOfficer , you will be responsible for implementing, running and overseeing the informationsecurity function across the countries and Tunstall entities in your scope, ensuring consistent and strong informationsecurity management in support of our business goals and More ❯
worldwide. The main office is based near Liverpool Street station, London. We have offices in Bermuda, Brazil, Cyprus, Greece, Hong Kong, Japan, and Singapore. Overall Job Purpose : The Junior InformationSecurityOfficer (JISO) will assist the InformationSecurity team in implementing and maintaining the informationsecurity management system with the objective of managing … risks to information assets to an acceptable level. The JISO will develop a good understanding of the informationsecurity policies, standards and procedures and will assist InfoSec in implementing, managing and monitoring the relevant controls. It is imperative that the JISO develops a strong understanding of the organisation's technology landscape to help identify potential threats and … vulnerabilities. Key Responsibilities: Assist in maintaining the informationsecurity standards, procedures and guidelines. Participate in the informationsecurity risk management process to identify, assess, treat and monitor risks. Manage informationsecurity incidents and events to protect information assets. Help develop and implement incident response plans and procedures to ensure that information services More ❯
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: Title: Chief InformationSecurityOfficer Requisition ID: 5935 Amey is a leading provider of full life-cycle engineering, operations, and decarbonisation solutions, for transport infrastructure and complex facilities. Working for us, you'll be delivering sustainable infrastructure solutions that … shared future. Our people are driven by a set of strong values, based on safety, insight, and collaboration. The Opportunity We have a fantastic opportunity for a permanent Chief InformationSecurityOfficer (CISO) to join Amey's group functions. As Chief InformationSecurityOfficer you will lead global cyber security and privacy across … the Amey Group, with a primary focus on security (approximately 70%) and strategic accountability for privacy (approximately 30%). You will define and implement long-term strategies aligned with business objectives, regulatory expectations, and customer trust. This includes articulating the security value proposition, contributing to the governance of AI and emerging technologies, and embedding secure-by-design and More ❯
Looking for a new challenge? Take a look at our current vacancies. If you see a vacancy that is right for you, we encourage you to apply! Chief InformationSecurityOfficer We currently have an exciting opportunity for an experienced Chief InformationSecurity Officer. If you are keen to maintain and develop an environment and … culture for our organisation that ensures and assures the security of our information and technology then we would really like to hear from you. Employment Type: Full-time Working hours: 35 hours per week. Where possible, we are open to considering part time/flexible working patterns. Please let us know in your application your desired working pattern … in 2023 and the ever-changing technology landscape, it is a very exciting time to be joining the Technology team here at the Financial Ombudsman Service. As our Chief InformationSecurityOfficer (CISO), you will maintain and develop an environment and culture for our organisation that ensures and assures the security of our information and More ❯
InformationSecurity & Compliance Officer sought to join the IT department of an award-winning, national recruitment agency group as they continue to expand their digital presence across multiple brands. This is a permanent, full-time role based fully onsite at the company's Meriden office, with occasional travel to other company sites. The Role: As InformationSecurity & Compliance Officer, you will become a key player in safeguarding the organisation's data and ensuring compliance with industry standards and regulations. As a crucial member of the Security and Compliance team, you will play an instrumental role in maintaining and enhancing our security controls across Microsoft Azure, Office 365, and during the migration … of our legacy systems to the Microsoft cloud. Your responsibilities will include: Evaluate and enhance existing IT systems, management procedures, and security protocols to ensure robust protection. Oversee ISO 27001 and other key accreditations by collaborating with internal teams and external auditors. Manage informationsecurity requests and compliance reports, ensuring adherence to GDPR and other relevant standards. More ❯
InformationSecurityOfficer Hybrid – Home & London | Permanent | Circa £60,000 | 35 hrs/week (flexible) A rare and brilliant opportunity to join this international development children’s charity, as their new InformationSecurityOfficer . You'll be the expert, working closely with the Chief InformationOfficer and other senior leaders to … embed security practices across systems, suppliers, and staff. You’ll be joining a small but impactful Technology team where the culture is collaborative and down-to-earth. You’ll have the autonomy to get stuck in, alongside the backing to develop professionally, whether that’s through security qualifications or broader leadership skills. What you will be doing As … InformationSecurityOfficer , you’ll lead the implementation of the organisation’s cyber security plans. Act as subject matter expert on informationsecurity across the organisation Ensure compliance with standards like Cyber Essentials Plus and CIS . Oversee third-party security providers and outsourced ICT services. Manage incident response planning, investigations, and reporting. More ❯
InformationSecurityOfficer Hybrid – Home & London | Permanent | Circa £60,000 | 35 hrs/week (flexible) A rare and brilliant opportunity to join this international development children’s charity, as their new InformationSecurityOfficer . You'll be the expert, working closely with the Chief InformationOfficer and other senior leaders to … embed security practices across systems, suppliers, and staff. You’ll be joining a small but impactful Technology team where the culture is collaborative and down-to-earth. You’ll have the autonomy to get stuck in, alongside the backing to develop professionally, whether that’s through security qualifications or broader leadership skills. What you will be doing As … InformationSecurityOfficer , you’ll lead the implementation of the organisation’s cyber security plans. Act as subject matter expert on informationsecurity across the organisation Ensure compliance with standards like Cyber Essentials Plus and CIS . Oversee third-party security providers and outsourced ICT services. Manage incident response planning, investigations, and reporting. More ❯
InformationSecurity & Compliance Officer sought to join the IT department of an award-winning, national recruitment agency group as they continue to expand their digital presence across multiple brands. This is a permanent, full-time role based fully onsite at the company's Meriden office, with occasional travel to other company sites. The Role: As InformationSecurity & Compliance Officer, you will become a key player in safeguarding the organisation's data and ensuring compliance with industry standards and regulations. As a crucial member of the Security and Compliance team, you will play an instrumental role in maintaining and enhancing our security controls across Microsoft Azure, Office 365, and during the migration … of our legacy systems to the Microsoft cloud. Your responsibilities will include: Evaluate and enhance existing IT systems, management procedures, and security protocols to ensure robust protection. Oversee ISO 27001 and other key accreditations by collaborating with internal teams and external auditors. Manage informationsecurity requests and compliance reports, ensuring adherence to GDPR and other relevant standards. More ❯
Chief InformationSecurityOfficer - DBT - SCS1 The Department for Business and Trade's Digital, Data & Technology directorate comprises 550 colleagues committed to delivering high-quality services, tools, and capabilities to support the department's objectives. As we mature after a period of rapid growth, this is an exciting opportunity to shape the evolution of our Cyber-Security … aligned with the Government Digital Service's capability framework. The Cyber team is central to our work, whether building, buying, or delivering digital, data, and technology services. The Chief InformationSecurityOfficer creates an environment and culture in the department that ensures the security of its information and technology. They enable the department to achieve … its objectives and deliver services in a safe and secure way. The Chief InformationSecurityOfficer role is part of both the Government Digital and Data profession and the Government Security profession. In this role, you will: Create a strategy for information and cyber security that supports both the department's strategy and wider More ❯
Solutions 71 is seeking an Information System SecurityOfficer (ISSO), to support a Department of Defense customer. The ISSO will assist the embedded US Army Program Executive Office (PEO) Combat Support & Combat Service Support Engineering Team to design comprehensive cyber security program protection plans. This position will directly support the Program InformationSecurity System … Manager (P-ISSM) and the Chief InformationOfficer (CIO). The ISSO position will also have comprehensive informationsecurity responsibilities that include verification of security measures and procedures, and the reporting of incidents briefing the P-ISSM and the CIO verbally and in documentation. Specific Duties/Tasks (included, but not limited to): • Supports the … CS&CSS ISSM and CIO in the informationsecurity planning, design, and execution for all aspects of the PEO CS&CSS mission. • Perform technical reviews of security controls, assess the adequacy of protective measures, evaluate residual risk, and determine the applicable severity value for each control. • Support all steps of the RMF process as defined in DoDI More ❯
Warren, Michigan, United States Hybrid / WFH Options
Softek International Inc
Description The Information System SecurityOfficer (ISSO) serves as the principal advisor to the Information System Owner (SO), Business Process Owner, and the Chief InformationSecurityOfficer (CISO)/Information System Security Manager (ISSM) on all matters, technical and otherwise, involving the security of an information system. ISSOs are … responsible for ensuring the implementation and maintenance of security controls in accordance with the Security Plan (SP) and Department of Defense (DoD) policies. In almost all cases, ISSOs will be called on to provide guidance, oversight, and expertise, but they may or may not develop security documents or actually implement any security controls. While ISSOs will … are being performed. As a result, it is important for ISSOs to build relationships with the SO, technical staff, and other stakeholders. Duties/Responsibilities: Essentials The goal of informationsecurity is to help the business process owner accomplish the mission in a secure manner. To be successful, ISSOs need to know and understand the following: Coordinates with More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Leyden Solutions Inc
Title: Information Systems SecurityOfficer (ISSO) Clearance: Active TS with ability to pass CI Poly to obtain SCI Location: Washington, DC (5 days/week onsite only; no remote work) Leyden Solutions is an award-winning national security company with an immediate need for an Information System SecurityOfficer (ISSO) to support a … federal law enforcement agency's migration from distributed systems to a data-centric audit and protection approach (DCAP) informationsecurity strategy. Responsibilities/Duties: • Ensure that appropriate steps are taken to implement informationsecurity requirements for IT systems throughout their life cycle, from the requirements definition phase through disposal. • Perform compliance monitoring, analysis, tracking and reporting … Apply NIST Risk Management Framework and NIST SP 800-53 security controls • Analyze and re-mediate weaknesses while working with system administrators and other personnel in the organization to implement risk mitigation • Configuring, designing, or analyzing security controls relevant to networked systems • Perform scans, analyze code, and conduct vulnerability scans and assessments. • Develop and present, both verbally and More ❯
minutes. Click OK to reset the timer to 0 minutes. You have been signed out. This service is set to sign out after 0 minutes of inactivity. Job Description - InformationSecurityOfficer () Job Description InformationSecurityOfficer - Description Job title: InformationSecurityOfficer Salary: £33044+ dependent on skills and experience What … Participate in investigating audit findings and compliance issues, sharing outcomes with stakeholders and supporting follow-up actions through to resolution Work collaboratively with the Team Lead to respond to security incidents and concerns identified or reported to the ISSO team, sharing relevant details with stakeholders and offering guidance to help reduce the likelihood of similar events in the future … of flexible discounted health, wellbeing and lifestyle benefits, including a green car scheme, private health plans and shopping discounts - you may also be eligible for an annual incentive. Applied InformationSecurity Specialist Team This is an exciting opportunity to join a forward-thinking team within the UK's F-35 training facility, based at RAF Marham. The role More ❯
important missions both at home and abroad. If you are ready to support a high-performing team that truly makes a difference, then come join us! Job Description: The Information System SecurityOfficer will provide vital support for the implementation and maintenance of our information assurance protocols. You will collaborate on the development, coordination, and enforcement … of information systems security policies, standards, and methodologies. The Senior Information Systems SecurityOfficer shall possess the following capabilities: Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of … the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and More ❯
Position: Information Systems SecurityOfficer (TS w/SCI Clearance Required) Location: Greater Boston, MA (Onsite) Length: 3+ years Job Description: Our client is seeking a skilled and motivated Information Systems SecurityOfficer (ISSO) to join their dynamic Cybersecurity Team. This role is crucial in maintaining and developing our InformationSecurity (IS … program and ensuring compliance with established security policies and procedures. The ISSO will be responsible for overseeing operational security implementation, vulnerability management, system assessments, and recovery processes. The ideal candidate will play a key role in safeguarding critical information systems and contribute to a comprehensive security posture. Essential Duties and Responsibilities: • Develop and maintain an Information Systems (IS) security program and policies to ensure the protection of sensitive and classified systems and data. • Monitor and enforce security policies for system implementation and configuration management. • Ensure the protection of information systems and recommend resources to maintain security. • Continuously monitor system vulnerabilities, assess potential threats, and respond to security incidents. • Oversee corrective actions More ❯
Information Systems SecurityOfficer (ISSO) Location: Washington D.C. or Riverdale, MD or Herndon, VA Job Type: Full-time Salary: $135,000 - $180,000 Job Description: As an Information Systems SecurityOfficer (ISSO) and Shape the Future of National Security! What You'll Do: Be the Security Advocate: Work closely with the Information Systems Security Manager (ISSM) to drive information assurance initiatives, including security authorization activities, compliance with Risk Management Framework (RMF) policies, and the development of System Security Plans (SSPs). Strengthen Our Defense: Perform Security Technical Implementation Guide (STIG) reviews, self-assessments, and participate in Assessment & Authorization (A&A) testing to ensure our systems stay … secure and compliant. Stay Ahead of Threats: Analyze system audit logs for unusual activity, conduct vulnerability assessments, and implement mitigation strategies to protect against potential risks. Shape Security Policy: Use your expertise to apply a comprehensive range of cybersecurity policies, principles, and techniques to maintain the integrity of systems processing classified information. Drive Risk Management: Perform risk analysis for More ❯
Clarksburg, West Virginia, United States Hybrid / WFH Options
Edgewater Federal Solutions, Inc
Edgewater Federal Solutions is seeking a Senior Information System SecurityOfficer (ISSO) to provide overall compliance of the security posture for our federal client. The ISSO will support the establishment, implementation, and maintenance of a life-cycle security model that develops, maintains, and dispositions information systems, services and data, and safeguards their confidentiality, integrity … and availability. Expertise in NIST compliance, Open Web Application Security Project (OWASP), Common Criteria, DISA and SANS institute. The position requires an active Top Secret Clearance and hybrid work environment (2-3 days onsite per week) performed in Clarksburg, West Virginia. RESPONSIBILITIES: • Coordinate with system owners to ensure systems are operated and maintained in accordance with security policies … and practices. • Reports all information system security incidents through the appropriate channels. • Creates security practices, including National Institute for Standards and Technology (NIST), Open Web Application Security Project (OWASP), Common Criteria, Defense InformationSecurity Agency (DISA) and SANS Institute. • Experience working in Scaled Agile Framework (SAFe) development environments. • Demonstrated level of experience in informationMore ❯
Gemini Industries Inc. provides technical, management and operations services to support National Security projects. We provide rapid response to the critical needs of our customers and those they serve. We perform analyses and develop operations plans to anticipate and prepare for the future. And we deliver advanced technology to improve our customer's success in executing its mission. Gemini … brightest personnel • Work at a high operations tempo • Integrated teams delivering rapid solutions. • An attitude that balances "I can make it better" with "As long as we succeed." Senior Information Systems SecurityOfficer Location: Arlington, VA (Pentagon) On site Clearance: TS/SCI Education: MA/MS (or BA/BS plus an additional 4 years of … s requirements that positively impact the client to either increase efficiency, effectiveness, or innovation. •Master position tasks within 60 days and exceed requirements within 90 days. Responsibilities: The Sr. Information Systems SecurityOfficer (ISSO) supports cybersecurity and Information Assurance (IA) related processes for the Secretary of the Air Force - Security, Special Program Oversight, and InformationMore ❯
Information System SecurityOfficer (ISSO) Level 3 LV8D Solutions is looking for an Information System SecurityOfficer (ISSO) Level 3 to provide advice and assistance to the Government regarding secure configuration and operation of IT assets. Level 3 ISSOs apply extensive knowledge and experience of a variety of information system security concepts … degree and 5+ years of relevant experience Clearance: • TS/SCI with CI Polygraph Requirements/Responsibilities: • Familiarity with conducting research and analysis • Thorough understanding and application of network security principles, practice, and implementations • Familiarity with controlling, labeling, virus scanning, and appropriately transferring data (uploading/downloading) between information systems at varying classification levels • Excellent communication, interpersonal, and … work to meet deadlines and to manage the workflow of the ISSO team • Thorough working knowledge of all applicable NRO, IC, DoD policies, procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM) • Working knowledge of cross-functional integration of information systems into a physical security environment • Working More ❯
Agile is seeking an Information Systems SecurityOfficer -, responsibilities include the following: Active TS/SCI clearance is required: Certification Requirements: CISM and one of the Following: (CGRC), Certified in Risk and Information Systems Control (CRISC), Information Systems Security Management Professional (ISSMP), Certified Information Systems Auditor (CISA), Certified Cloud Security Professional (CCSP … continuity, introduction of innovation, and enhancement of technical competence. Serve as the principal advisor to the Authorizing Official (AO) and System/Service Owner (SO) on all matters involving information system security. Develop, implement, assess, and maintain system-level information system security controls in accordance with Department of Justice, NIST 800-53, and other federal regulations. Support … data calls, audits, system security assessments & authorizations, continuous monitoring, and ongoing authorizations. Work with the System Owner to categorize the information system, identify the appropriate control baseline, and assess correlating security controls. Create, capture, and maintain artifacts and documented processes to support control assessment results Qualifications: Minimum of 2 years of hands-on experience and knowledge in More ❯
military coursework/training in a computer-related field plus 10 years of relevant experience, OR +High School diploma/GED plus 12 years of relevant experience. Degree in Information Assurance, InformationSecurity, Information Systems, Information Technology, Computer Networking, Information Science, Cyber Security, or related is preferred. Relevant experience must be in information systems design, development, programming, information/computer/cyber/network security, vulnerability analysis, system auditing, penetration testing, computer forensics, computer systems research, and/or systems engineering (i.e., requirements analysis, design, implementation, testing, integration, deployment/installation, and maintenance). Experience in the Risk Management Framework (RMF), Information Systems Security technologies, IT policies, and … the relevant experience requirement. Continued assignment to this work role is contingent upon compliance with NSA's Cyberspace Workforce Improvement Program (CWIP) per NSA/CSS Policy 6-34; Information Assurance Manager (IAM) Tier 1 certification requirements must be met within 6 months of assignment to the position. Maintaining certification status is required through continuous education training or sustainment More ❯
the nation and the world are counting on us to deliver. Join the transformation and help us make this impact now. BlueHalo, an AV Company, is seeking a strong Information System SecurityOfficer to join the team and provide aid to the program, organization, system, or enclave's information assurance program. In this position the individual … will lend assistance for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies If that sounds like you and you're ready to make an impact now, not later, read on for the details and apply to make the most out of your career. You'd like to do this Assist security authorization activities … in compliance with Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Maintain operational securityMore ❯
The Information Systems Security Engineer II Hanover, MD TS/SCI Full Scope Polygraph (On site, 40 hrs.' per month remote) The Information Systems Security Engineer II (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and … recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems … deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate informationsecurity functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architecture. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats More ❯