Information Assurance, IAVA, System Security Plans (SSPs), RMF, Windows, Linux, Authorization to Operate, Verification and Validation, Security+, Security X, CASP+, NIST 800-53 Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/…/active polygraph (Polygraph must be within the last five (05) years). At least twelve (12) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, InformationSecurity, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar … processes may be substituted for a bachelor's degree. Security+ Certification or Security X (previously known as the CASP+) Certification required Must have experience as ISSO working independently, and/or on teams maintaining secure information system operations in isolated, connected and standalone environments. Must have at least five (05) years of experience using tools to support IAVA More ❯
Dollars for electrifying their homes, shifting usage to off-peak hours, and supporting grid stability-critical for scaling AI and energy-intensive industries. We're looking for a Chief InformationSecurityOfficer (CISO) to lead our company-wide security strategy. You'll protect our infrastructure, digital assets, and customer data while enabling fast, secure growth. Key … Responsibilities Security Strategy & Leadership Define and lead Fuse's security strategy across infrastructure, applications, and data. Lead hands-on development of security roadmaps, maturity models, and control frameworks tailored to Fuse's risk profile. Directly contribute to architecture reviews, threat modelling sessions, and key design decisions across product and platform teams. Build and mentor a high-performing … security team, including hiring, coaching, and managing performance. Develop KPIs and reporting structures to measure and communicate security posture to leadership and the board. Advise the executive team on security risks, regulatory exposure, and investment priorities to support long-term growth. Governance & Compliance Own company-wide security governance, including data protection, access control, and insider risk. More ❯
Information System SecurityOfficer (ISSO) L Garde is a full-service design, development, manufacturing, and qual-test supplier to Tier 1 primes and government agencies. We provide systems engineering and skilled technicians to make your Skunk Works-type project a reality. With over 50 years of aerospace and defense expertise, our deployable systems test the limits of … what's possible in the harshest of environments - in space, on the moon, and even on other planets. We are seeking a diligent and resourceful Information System SecurityOfficer (ISSO) to join our team. If you are a proactive cybersecurity professional with a passion for protecting critical systems and making an impact in national security, this … classified aerospace and defense environment. You will collaborate with leadership, IT, and compliance teams to ensure that cybersecurity controls meet stringent federal requirements. You will drive compliance initiatives, monitor security posture, and actively safeguard the systems that make critical projects a success. Key Responsibilities: Cybersecurity & Compliance •Support implementation, monitoring, and continuous improvement of cybersecurity controls in accordance with the More ❯
Position Overview: We are seeking an Information Systems SecurityOfficer (ISSO) to support cybersecurity and information assurance activities at Eglin AFB. The ideal candidate will help ensure the confidentiality, integrity, and availability of mission-critical systems by implementing and managing security controls in compliance with Department of Defense (DoD) cybersecurity policies and standards. Key Responsibilities … Develop, implement, and maintain security documentation, including System Security Plans (SSPs), Plan of Action & Milestones (POA&Ms), and risk assessments. Support system accreditation and continuous monitoring activities under the Risk Management Framework (RMF). Conduct vulnerability assessments, track remediation efforts, and verify that security requirements are effectively implemented. Monitor system compliance with DoD, NIST, and organizational security policies. Participate in security audits, inspections, and assessments. Collaborate with system administrators, engineers, and program teams to ensure secure system design and operations. Support incident response by documenting and coordinating response actions. Provide recommendations to improve system security posture and support security awareness initiatives. Required Qualifications: Active Secret clearance (or higher). Current CompTIA Security+ certification More ❯
Information Systems SecurityOfficer Aberdeen Proving Ground, MD - 100% On-Site The Job Our client's team members are subject matter experts in both cybersecurity and US Government policy. Our client is excited about generating creative solutions to ambiguous security requirements. Their mission is deploying software in support of their customers' most critical needs as quickly … of the Authorization to Operate (ATO) process. They're seeking dedicated and motivated individuals with Systems Administration, Software Development, or Systems Engineering backgrounds to join our team as an Information System SecurityOfficer (ISSO). You will collaborate with other engineers to ensure security policies and settings are in place, build standardized security documentation, and … of compliance once settings have been applied. Functions • Achieve ATOs for our client's software across multiple government customers with minimal oversight. • Partner with engineers to analyze software, interpret security requirements, and plan effective control implementations. • Provide outstanding customer service, policy expertise, and high-quality documentation. • Serve as the primary in-person point of contact for one or more More ❯
Position: Systems Administrator/Information Systems SecurityOfficer (ISSO) Massa Products Corporation seeks a Systems Administrator (SysAd) and Information Systems SecurityOfficer (ISSO) to help build and maintain our IT computing and network infrastructure, as well as ensure Information Assurance (IA) compliance in both unclassified and classified environments. Additionally, the successful candidate will … employees and third-party vendors on IT and cybersecurity projects. o Develop and administer instructions and/or conduct training for system users on operating systems, relational databases, cyber security requirements, and other applications. o Maintain confidentiality, availability, and integrity regarding the information being processed, stored, or accessed on the network o Assists in maintaining backup/restore … and disaster recovery preparedness. o Maintain accurate and up-to-date software and hardware inventory listing. o Align information technology (IT) priorities with the security strategy. o Provide occasional off-hours support during outages, system upgrades, or other critical, time-sensitive events. Requirements and Education: Required Qualifications: • Bachelor's Degree from an accredited college or university in computer More ❯
Job Number: 72 Job Category: GovTech Job Title: INFORMATION SYSTEMS SECURITYOFFICER - FLORIDA - URGENT Job Type: Full-time Clearance Level: Top secret/SCI Work Arrangement: On-site Job Location: FL Tyndall AFB Salary: 100k - 150k Background Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information Ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure Respond to computer security breaches and viruses Implement information system security requirements, system security plans, assist with the development of ATO packages and ensure all auditing requirements are completed Ensure all system security procedures are followed including updates to system security … patches, updates to antivirus definition files, and ensuring audit files are maintained and reviewed Interface regularly to address any issues and ensure compliance with all pertinent regulations related to information system security Provide IAO/ISSM functions necessary to maintain mission effectiveness Requirements BS degree 5-9 years of experience Experience assisting in the development of ATO packages More ❯
Overview We're seeking an experienced Information System SecurityOfficer (ISSO) for a hybrid role (2-3 days/week) onsite. You'll collaborate with Government stakeholders, engineers, and developers to assess cyber risks, enforce security policies, and implement mitigation strategies. This role supports secure operations across cloud infrastructure, AI/ML solutions, CI/CD … implementing risk management frameworks using NIST standards (e.g., SP 800-30, 800-53, 800-128, 800-160, 800-171) and CIS benchmarks. 3+ years supporting cybersecurity operations as an Information System SecurityOfficer (ISSO) or similar role. Experience applying security controls aligned with RMF, FedRAMP, ICD 503, and DoD Information Levels. Hands-on experience with … implementing mitigations, and reviewing audit logs for anomalies. Familiarity with continuous monitoring practices and tools. Security+ or higher certification. High School diploma or GED. Key Responsibilities Implement and maintain security controls across cloud and on-prem environments. Support system authorization efforts, including package development and submission. Interface with internal and external cybersecurity stakeholders, including PMs, AOs, and Cyber Assessors. More ❯
BlueHalo, an AV company, is seeking a highly motivated and experienced Information Systems SecurityOfficer (ISSO) to play a critical role in achieving and maintaining Authorization to Operate (ATO) for information systems. The ISSO candidate will be responsible for evaluating the security posture of assigned systems throughout their lifecycle, ensuring compliance with federal security … regulations and frameworks, primarily the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). This role requires a deep understanding of the ATO process, strong technical security skills, and excellent communication abilities to collaborate with various stakeholders. This position could support multiple projects, primarily government programs with some support of commercial programs. The candidate will work … a team comprised of AV, sub-contractors, associate contractors, and end-customer personnel. Responsibilities and Typical Duties: Support the development, review, and maintenance of comprehensive ATO documentation (e.g., System Security Plan (SSP), Contingency Plan (CP), Privacy Impact Assessment (PIA), Risk Assessment Report (RAR), Plan of Action & Milestones (POA&M . Ensure all documentation adheres to relevant security policies More ❯
This is a contingent opportunity The ISSO is responsible for the administration and management of the InformationSecurity program for Headquarters United States Space Force (HQ USSF) Staff Security Office. Duties: Provide Information Systems SecurityOfficer duties for USSF, to include coordination of software and hardware change/problem resolution, account access, data transfers … scanning, and copying data to/from external media; Attend required technical and security training (e.g. Operating system, networking, security management) relative to assigned duties; Maintain compliance for designated HQSF locations throughout HQSF Area of Responsibility (AOR) IAW AF, DoD and IC guidance; Conduct annual Cyber Assurance self-assessments and program reviews for all assigned SCI and/… or SAP facilities; Provide AF Joint Worldwide Intelligence Communications System (JWICS) account and Public Key Infrastructure (PKI) certificate support and troubleshooting assistance; Process information technology (IT) and asset requirements and purchases; Oversee IT disposal and destruction IAW DoD policies and agency procedures; Conduct annual hardware inventories and maintainrecords of IT systems within facilities overseen by DSZ; Oversee the identifying More ❯
UiPath, we're enabling the fully automated enterprise-but innovation must be secure to be transformative. That's where you come in. We're looking for a Field Chief InformationSecurityOfficer (Field CISO) to serve as a strategic security advisor to our customers and partners, guiding them through the complex landscape of compliance, governance, and … secure development of Automations and Agentic AI. You'll work at the intersection of customer success, product innovation, and cybersecurity thought leadership-translating strategic security insights into real-world impact. What you'll do Act as the primary security advisor for clients, assessing their needs, and providing strategic recommendations. Conduct security risk assessments and design tailored strategies … that align with business goals and regulatory requirements. Educate clients on how to leverage UiPath's platform for secure SDLC and best-in-class security outcomes. Deliver executive-level thought leadership, representing UiPath in industry forums, events, and customer engagements. Collaborate with internal teams (Product, Sales, Legal, Engineering) to align customer needs with product and roadmap decisions. Create and More ❯
Kingdom, and Australia. Together, they will deliver a unique 24/7 all-weather capability, tracking objects in geosynchronous orbit - a testament to Northrop Grumman's commitment to enhancing security and safety in deep space on a global scale. Your Role The Information Systems SecurityOfficer (ISSO) is responsible for the day-to-day onsite execution … of the Systems Security Engineering activities required for the ongoing maintenance and uplift of the cybersecurity posture within the project. This spans systems, subsystems, products and external interfaces, and may include a mixture of operational cybersecurity functions and governance, risk and compliance (GRC) activities. Key responsibilities include: Perform systems security risk management activities, including identifying security threats … analysing the risk exposure and presenting treatment options to mitigate security risk. Conduct asset management including maintaining accurate inventories of all hardware and software configuration items. Maintain change management, through evaluation of system changes for cybersecurity impact and updating any affected security authorisation artefacts. Perform vulnerability management, including conducting automated vulnerability scans, using the provided toolset, to identify More ❯
Position Summary: As an InformationSecurity Systems Officer (ISSO) supporting Kitty Hawk Technologies Department of Defense (DoD) contracts, you will be responsible for maintaining the cybersecurity posture of classified and unclassified information systems. You will ensure compliance with DoD cybersecurity policies and standards, including the Risk Management Framework (RMF), NIST Special Publications, and DoD Instructions (e.g. … . The ISSO works closely with the FSO, IT staff, and program stakeholders to ensure systems meet and maintain authorization to operate (ATO). Key Responsibilities: • Implement and maintain security controls in compliance with DoD RMF, NIST SP 800-53, and DoDI 8510.01. • Maintain and update System Security Plans (SSPs), Plans of Action and Milestones (POA&Ms), and … related security documentation. • Support system Assessment and Authorization (A&A) activities to obtain and maintain Authority to Operate (ATO). • Conduct and document regular security reviews, risk assessments, and audit log analysis. • Assist with vulnerability scanning and remediation (e.g., ACAS, Nessus, STIGs, SCAP). • Enforce security policies, procedures, and guidelines for users, developers, and administrators. • Report and More ❯
Information Systems SecurityOfficer (ISSO) Mid-Senior Level $90,000 - $140,000 Colorado Springs, CO TS/SCI Clearance Required Protect critical systems. Power national defense. Your cybersecurity leadership starts here. A Day in the Life - What You'll Do • Maintain and enhance the security posture of classified information systems within DoD environments. • Collaborate with … the ISSM and ISO to manage day-to-day cybersecurity operations, vulnerability mitigation, and RMF compliance. • Coordinate and document system security changes, continuous monitoring efforts, and configuration management activities. • Conduct audit reviews, security assessments, and generate compliance reports for internal stakeholders and external government agencies. Is This You? • 5-15 years of experience in cybersecurity or information assurance roles supporting defense or government systems. • Bachelor's degree in STEM (Science, Technology, Engineering, or Mathematics). • Active Top Secret/SCI clearance is required. • Detail-oriented, security-focused, and confident interfacing with both technical teams and senior leadership. • Skilled in implementing and managing Risk Management Framework (RMF) processes and conducting security impact analysis. Core Skills More ❯
Als Business InformationSecurityOfficer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business More ❯
Als Business InformationSecurityOfficer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business More ❯
Als Business InformationSecurityOfficer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business More ❯
Maintain the appropriate operational security posture for assigned systems, programs, and/or enclaves. • Provide guidance and technical expertise on all matters that impact or effect the security of the information system. • Assist in the development and execution of an enterprise level continuous monitoring program to minimize security risks and ensure compliance with that program on … a routine basis. • Developing, updating, and submitting the System Security Plan and other required documentation that make up the Security Authorization Package. • Conduct configuration management for security-relevant changes to software, hardware, and firmware. • Perform and deliver security impact analyses of changes to the system or its environment of operation. • Assess the effectiveness of system security controls on an ongoing basis to determine system security status. • Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments. • Provides configuration management for security-relevant information system software, hardware, and firmware. " Education and Experience: • 10 years of related work experience in the field of security authorization. • A More ❯
What You'll Be Working On: ️ Leading and developing the organization's informationsecurity strategy, policies, and programs ️ Overseeing the implementation of risk management practices and ensuring compliance with industry regulations (e.g., GDPR, ISO 27001) ️ Managing and mentoring the cybersecurity team to strengthen the organization's security posture ️ Collaborating with cross-functional teams to align security … leadership on the state of cybersecurity and potential risks What We're Looking For: ️ Proven experience as a CISO or in a senior cybersecurity leadership role ️ Extensive knowledge of informationsecurity frameworks, governance, and compliance standards ️ Strong experience in risk management, incident response, and disaster recovery planning ️ Ability to communicate complex security concepts to non-technical stakeholders More ❯
Marathon TS is seeking a Information Systems SecurityOfficer (ISSO) II in Dayton Ohio for WPAFB. Job Description : Summary: The ISSO II's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will … provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Essential Duties & Responsibilities: Review, prepare, and update AIS authorization packages Notify customer when changes occur that might affect AIS authorization Perform AIS self-inspections, provide security coordination and review of all system test plans Identify AIS vulnerabilities and implement countermeasures Represent … the customer on various technical review and inspection teams Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system authorization packages Coordinate, prepare, and track AIS inspections, reports, and responses Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities Prepare reports on the status of More ❯
Seeking Information System SecurityOfficer candidates for contingent prime award expected June 1, 2025. Must have 8+ years experience with a Bachelor's in a STEM field or 12+ years experience without a degree. Must also have an IAM Level I certifications which can include any one of the following: - CAP - CND - Cloud+ - GSLC - Security+ CE More ❯
A leading federal contractor is seeking a qualified and motivated Cybersecurity Information System SecurityOfficer (ISSO) Level 3 to support a mission-critical Department of Defense (DoD) program. This role offers the opportunity to join a team of professionals committed to cybersecurity excellence and national defense. As an ISSO, you will apply and manage IT security … lifecycle-including assessment, authorization, sustainment, and system disposition. You'll collaborate with Certified Defense Contractors to uphold continuous monitoring standards and meet change management requirements. Close coordination with the Security Control Assessor (SCA) and Authorizing Official Designated Representative (AODR) is essential to obtain and maintain security approvals. Additional duties include account management, auditing, vulnerability scanning, and advising both … ME in Computer Science, Cybersecurity, MIS, or related field Relevant certifications or equivalent experience may be considered in lieu of a degree 1+ year of experience implementing RMF IT security controls and policies DoD 8140/DoD 8570 IASAE Level II certification Security Professional Education Development (SPēD) certification More ❯
of similar scope, type, and complexity. DoD 8570 compliance with IAM Level II or IAT Level III (i.e., CASP, CISSP, or Associate) Bachelor of Science degree in Computer Science, Information Assurance, InformationSecurity, or related discipline and 12 or more years of related experience. More ❯
activities. -Manage POA&M activities related to ATO Asset where possible in completing POA&M activities. -Ensuring the implementation of DOE and NNSA cybersecurity policies and procedures for designated information systems Conducting the Assessment and Authorization (A&A) activities for designated systems -Documenting the implementation of protection measures within the security plan for the systems -Ensuring the appropriate … is provisioned for users of designated systems. -Work to establish and maintain Configuration Management of documentation Identifying, assessing, and documenting threats and risks to designated systems. Capturing and maintaining information system security artifacts. -Work to establish and maintain Configuration Management of documentation. -Conducting cybersecurity tests and assessments and providing results of these activities to the ISSM. -Evaluating the … security impact and recommending implementation strategies for security significant changes to the assigned info Identifying cyber security training needs in terms of job responsibilities or roles. -Conducting information system risk assessments. -Responding to and reporting of incidents related to their assigned information systems. -Development of security processes and procedures to support the ISSM's More ❯
measures, and Ensuring that these mitigation measures are properly implemented, and validating them for any project involving critical assets Monitor the performance of cybersecurity suppliers and services, ensure Cyber Security Insurance is appropriate to meet UK requirements Participate in the management of major Cyber incidents and crisis concerning technology assets, monitor and implement associated action plans Raise awareness of … Cyber risks, particularly among Division/UK top management and Technology contacts (development security, application security Deploy a Cyber Essentials Plus program to address all in scope services across the UK, Participate in the European NIS2 program as appropriate Create training material and other resources to influence user behaviour for adoption of security policy and process What … are the requirements? Extensive experience in leading IT Security activities in complex, multi-site environments that have operational technology elements. CISSP (Certified Information Systems Security Professional) Microsoft certifications and/or network qualifications ITIL Foundation Must have a sound knowledge of risk management, compliance frameworks, integrating security into projects, developing and monitoring indicators and executing action More ❯