security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and … networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and More ❯
Information Security (IS) program and ensuring compliance with established security policies and procedures. The ISSO will be responsible for overseeing operational security implementation, vulnerability management, system assessments, and recovery processes. The ideal candidate will play a key role in safeguarding critical informationsystems and contribute to a comprehensive security posture. Essential Duties and … and maintain an InformationSystems (IS) security program and policies to ensure the protection of sensitive and classified systems and data. • Monitor and enforce security policies for system implementation and configuration management. • Ensure the protection of informationsystems and recommend resources to maintain security. • Continuously monitor system vulnerabilities, assess potential threats, and respond to … Ensure proper recovery procedures are in place to restore security features and systems after an incident. • Report and mitigate security breaches in a timely manner. • Develop, update, and maintain System Security Plans (SSP) for all relevant systems. • Manage and control changes to systems, ensuring compliance with security policies and conducting risk assessments. • Ensure compliance with internal security policies and More ❯
seeking an Information Technology Systems Engineer to support the F-35 Joint Program Office (JPO) efforts to improve the F-35 the Autonomic Logistics InformationSystem (ALIS) and Operational Data Integrated Network (ODIN) Information Technology systems. ALIS and ODIN are large and complex IT systems that integrate and enable functions including the maintenance … collaborate on systems architecture efforts. Assist the Maintenance Systems Requirements Engineer to produce a Product Specification for the as-delivered ALIS and ODIN products. Support the development of a System Specification for future versions of ALIS/ODIN. Coordinate with other internal and external organizations, including prime contractors on key engineering initiatives. Conduct searches for, and identify GOTS and … servers and boundaries (e.g. cloud-based systems AWS/Azure/Google Cloud) Knowledge and competency in one of the following areas: Systems and software requirement analysis and allocation. System and subsystem level hardware-software integration. Experience in accepted project management techniques, applications and processes. Experience in preparing, reviewing, and analyzing engineering reports, test plans, test reports More ❯
other project team members Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of Cybersecurity architectures, systems, or system components Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures Support security planning, assessment, risk analysis, and risk management Identify overall security requirements for the proper handling of Government data Provide security planning, assessment, risk analysis, and risk management Perform system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements Recommend system-level solutions to resolve security requirements Requirements: Twenty (20) years experience as an … and CISSP Certifications are required. Clearance Required: Active TS/SCI with Poly Minimum Education: Bachelor's degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required. A Master's degree in Computer Science, Information Assurance, Information Security SystemMore ❯
Impact: Are you interested in using your skills to help shape the Cyber, Security, & Intel space? If so, look no further. Amentum is seeking a Principal InformationSystem Security Engineer to join our team of passionate individuals in Chantilly, VA. In this role you will support challenging, mission-critical projects that make a direct impact on the … Nation's security and intelligence mission. We are seeking a highly skilled and experienced Principal InformationSystem Security Engineer to join our team. The successful candidate will bring extensive knowledge and hands-on experience in cybersecurity engineering, risk management frameworks, and secure software development lifecycle management. This role involves leading and managing accreditation efforts, conducting … security across our applications and systems. Responsibilities: Oversee cybersecurity measures for applications within an agile software environment. Manage the assessment and authorization (A&A) efforts for accrediting and reaccrediting system authorizations. Performs vulnerability scanning to uncover any potential security concerns within the information systems. Utilize common control provider (CCP) knowledge to secure authorization for applications on new More ❯
Travel Required: None Type of Travel: None The Opportunity: CACI has an immediate opening for a Junior Automated InformationSystems Analyst to provide Navy Tactical Command Support System (NTCSS) System Administration support services and training to COMNAVAIRLANT (CNAL) and its supported CVN ADP/CS-3 communities. These services are managed under the USFFC Naval Forces … Logistics (NFL) contract at our Naval Station Norfolk location in Norfolk, VA. Responsibilities: Troubleshoot and assess system administration requirements to resolve existing NTCSS RSUPPLY/NALCOMIS logistics application processing errors, analyze NTCSS applications and support utilities for operational status, resolve pending challenges and provide server/workstation software install/upgrades support. Respond to CVN requests for assistance with … NTCSS server management. Provide System Administration Support to CNAL/CVNs via onsite visit, phone and/or email correspondence. Provide NTCSS System Administration training. Assist in testing, debugging and documenting new software/procedures. Assist in system administration and management of CNAL's NTCSS servers on NMCI network. Recommend/develop enhancements to existing More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validate and verify system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate IA and security systems and system components including those for … of Agency security policy and enterprise solutions. Support the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the program life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification, and awareness activities for system and … Review certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Support security authorization activities in compliance with NSA/CSS InformationSystem Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes More ❯
Edge InformationSystems Security Engineer (ISSE) Springfield, VA Full-Time On-site Immediate Hire Join our team and bring your cybersecurity expertise to a mission that matters. We're seeking an experienced InformationSystems Security Engineer (ISSE) to provide critical cybersecurity support to our government customer in Springfield, VA. This is a high-impact role working … consulting services and escalated support to edge systems via the following activities: Understanding and translating DoD/IC and agency-specific cybersecurity policies, procedures, and security controls through the system development lifecycle. Maintaining awareness of new and upcoming policies or requirements and developing solutions to address the need. Streamlining cybersecurity management practices using common controls or centralized … testing and reporting ot evaluate security control effectiveness, identifying deficiencies as plans of actions an milestones (POA&Ms), and providing recommendations that improve or enhance employed cybersecurity mechanism. Evaluating system body of evidence documents for compliance and providing recommendations that address gaps. Analyzing, evaluating, and providing recommendations on COTS, GOTS, and other technologies for system implementation. Supporting systemMore ❯
Security Engineer (ISSE-4) to provide senior-level cybersecurity engineering support for mission-critical programs in Chantilly, VA . The ISSE will integrate security requirements into acquisition strategies and system designs, ensuring compliance with government and industry best practices. This role requires deep technical expertise, leadership, and hands-on experience with secure systems engineering across the entire lifecycle. What … You'll Do Lead informationsystems security engineering activities across acquisition and development. Define, capture, and integrate security requirements into system architectures. Review and advise on system security designs and architectures. Support secure coding, IA engineering, and certification & accreditation processes. Develop, revise, and review security documentation including test plans, SSPs, and SCTMs. Advise developers on secure … methods to reduce system risk Collaborate with stakeholders and A&A teams to ensure security integration. Proactively identify opportunities to enhance security and mission outcomes. Do You Have What It Takes? Required: Active TS/SCI with Polygraph. Bachelor's degree + 11 years (or equivalent: HS , Associate's , Master's +9). DoD 8570 IAT Level III certification More ❯
The InformationSystem Security Specialist III role encompasses a broad range of information security disciplines, including risk assessment, security architecture development, vulnerability management, compliance adherence, incident response, and cybersecurity. DUTIES AND RESPONSIBILITIES Risk Assessment: Conduct comprehensive risk assessments to identify vulnerabilities and threats to information assets, systems, and networks. Analyze potential … procedures, and controls. Update patches to address vulnerabilities and support preparation and recurring scans/documentations to maintain IATT/ATO. Install, update, and troubleshoot systems/servers. Check system hardware availability, functionality, integrity, and efficiency. Conduct functional and connectivity testing to ensure continuing operability. Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine … to ensure compatibility with organizational standards, business rules, and needs. Develop and document systems administration standard operating procedures. Ensure the application of security patches for commercial products integrated into system design meets the timelines dictated by the management authority for the intended operational environment. Maintain baseline system security according to organizational policies. Identify and analyze anomalies More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Wood Federal Solutions, Inc
Overview InformationSystems Security Officer, Senior Location: Annapolis Junction, Maryland, USA Job Type: Full-Time Shift: Days Telework: None Salary Range: $135,000 to $170,000 Starting salary is based on minimum education and years of experience and increases based on education and/or experience. Overview: Join a mission-critical program supporting national security as an Information … Support configuration management (CM) for security-relevant software, hardware, and firmware. Analyze threats and implement best practices for incident detection, reporting, and remediation. Maintain detailed records of system components including servers, routers, firewalls, and workstations. Ensure systems maintain an appropriate operational security posture. Assist the InformationSystem Security Manager (ISSM) in maintaining IA posture … across systems and enclaves. Develop and maintain Certification & Accreditation (C&A) documentation in accordance with federal guidelines. Create and update System Security Plans (SSPs) and related documentation. Administer user identification and authentication mechanisms. Qualifications Basic Qualifications: Minimum 10 years of experience as an ISSO, independently or on teams managing secure systems in various environments. At least 5 years of More ❯
MANTECH seeks a motivated, career and customer-oriented Senior InformationSystem Security Representative (ISSR) to join our team in Washington, DC. Responsibilities include, but are not limited to: Provides overall configuration management infrastructure and environment to the product development team. Developing or modifying CM plans, policies, and procedures tailored to the complexity and scope of … the developmental or operational system Ensure that FBI ISs are operated, maintained, and disposed of in accordance with the internal security policies and practices outlined in the approved Security Assessment and Authorization (SAA) package. Manage the SAA process for new FBI ISs and legacy FBI ISs migrating into the GRC application Provide baseline security controls to the system owner, contingent upon the IS's security categorization, type of information processed and entity type. Provide a recommendation to the Authorizing Official, in consultation with the system owner, regarding systems' impact levels and ISs' authorization boundary Initiate, coordinate, and recommend to the FBI Authorizing Official all Interconnection Security Agreement (ISAs), Memorandum of Understanding (MOUs), and Memorandum More ❯
of Travel Required: None Type of Travel: The Opportunity: We are seeking a skilled professional to provide comprehensive support for the information assurance program of an organization, system, or enclave. This role will involve actively contributing to the proposal, coordination, implementation, and enforcement of informationsystems security policies, standards, and methodologies to ensure the protection … management (CM) processes for informationsystems security software, hardware, and firmware. The candidate will also play a key role in assessing the security impact of system changes and ensuring that all security modifications are properly documented. The role requires preparing and reviewing critical documentation such as System Security Plans (SSPs), Risk Assessment Reports, Certification … and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Additionally, the candidate will support security authorization activities in alignment with the National Institute of Standards and Technology Risk Management Framework (NIST RMF). This position offers an exciting opportunity to contribute to the security and compliance of vital informationsystems, ensuring they More ❯
Responsibilities: • Support IT security goals and objectives and reduce overall organizational risk. • Assist with the collection of data needed to meet system cybersecurity reporting. • Communicate the value of IT security throughout all levels of the organization stakeholders. • Assist with security improvement actions as they are evaluated, validated, and implemented. • Assist with cybersecurity inspections, tests, and reviews for the network … A process. • Assist with the tracking of audit findings and recommendations to ensure that appropriate mitigation actions are taken. • Assist with the identifying security requirements specific to an IT system in all phases of the system life cycle. • Assist with the successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with … NSWCPD and NAVSEA 03 SOP. • Develop findings reports and recommended corrective actions for identified deficiencies. • Coordinate with programs to resolve findings identified during internal and external review processes. • Report system compliance in DON Application and Database ManagementSystem (DADMS), Department of Defense Information Technology Portfolio Repository - Department of the Navy (DITPR-DON), and VRAM. More ❯
of Travel Required: None Type of Travel: The Opportunity: We are seeking a skilled professional to provide comprehensive support for the information assurance program of an organization, system, or enclave. This role will involve actively contributing to the proposal, coordination, implementation, and enforcement of informationsystems security policies, standards, and methodologies to ensure the protection … management (CM) processes for informationsystems security software, hardware, and firmware. The candidate will also play a key role in assessing the security impact of system changes and ensuring that all security modifications are properly documented. The role requires preparing and reviewing critical documentation such as System Security Plans (SSPs), Risk Assessment Reports, Certification … and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Additionally, the candidate will support security authorization activities in alignment with the National Institute of Standards and Technology Risk Management Framework (NIST RMF). This position offers an exciting opportunity to contribute to the security and compliance of vital informationsystems, ensuring they More ❯
our customers. Our corporate values are transparent; being open and honest with each other. Come and join our dynamic team! JOB DESCRIPTION Seeking a highly motivated and driven InformationSystems Security Officer (ISSO) to work Onsite to support enterprise IT for our War-fighter customer who upholds America's status as the "Land of the Free" every day … RMF authorization packages. Prepare/Update RMF documentation. Prepare IATTs and Use Case MFRs as required to support development and testing. Prepare for CyberSafe authorization in parallel with the system authorizations. Establish Cybersecurity policies IAW security control implementations. Implement a Cybersecurity Plan. Perform asset and vulnerability management via VRAM reporting. Perform vulnerability assessments and system authorization … activities through collaboration with SMEs (System Administrators, Network Admins, Lab Managers, Program Managers, and ISSMs). Perform system security assessments. Evaluate and report software IAW DITPR/DADMS requirements. REQUIREMENTS 6+ years of experience in informationsystems security. Experience and proficiency in the following: Risk Management Framework (RMF) processes. Cybersecurity/A&A tools More ❯
Job Summary Galapagos Federal Systems, LLC is seeking a highly motivated and well-qualified professional to join our team as a Cybersecurity InformationSystems Security Engineer SME. This role offers the opportunity to work alongside a team of talented and diverse individuals supporting mission-critical operations for the Department of Defense (DoD). The selected candidate will provide … closely with the Program Manager to strengthen the cybersecurity posture of classified DoD programs and ensure alignment with DoD policies, directives, and mission priorities. Key Responsibilities The Cybersecurity InformationSystems Security Engineer SME will: Ensures the confidentiality, integrity, and availability (CIA) of capabilities supporting U.S. Space Force (USSF) priorities Provides subject matter expertise (SME) in cybersecurity posture, including … deadlines Conducts timely, in-depth research and analysis of policies and processes to support mission objectives Applies IT security control requirements to safeguard the confidentiality, integrity, and availability of system data and resources Ensures all solutions are fully compatible with system and network hardware/software configurations and receive approval from system and network configuration managers Required More ❯
a minimum of 5 days per week and is only located in the location(s) posted. No relocation is offered. Description of Job Duties/Responsibilities: Validating and verifying system security requirements and establishing system security designs for large-scale systems, major system elements, and interfacing systems that are part of a large complex network environment with … geographically distributed components. Identifying and implementing appropriate information security architectures and functionality to ensure Recommending and developing technical solutions, products, and standards based on current and desired system security architecture. Assessing and mitigating system security threats and risks throughout the program life cycle. Leading and/or contributing to the security planning, assessment, risk analysis, risk … management, certification and awareness activities for various system and networking operations. Effectively collaborating with other internal technical experts on a day-to-day basis. Communicating with Program Managers and POCs from customer organizations when necessary, regarding Security issues of significant importance. Participating in Program Increment Planning and related agile team activities. Working closely with System Engineering More ❯
Description: The ISSO Level 2 supports the information assurance program for a program, organization, system, or enclave. This role involves proposing, coordinating, implementing, and enforcing security policies, standards, and methodologies for information systems. The ISSO maintains the security posture of systems, ensuring that security policies and procedures are established and followed. Key Responsibilities: Support senior … ISSOs in implementing and enforcing security policies, standards, and methodologies. Assist in preparing and maintaining security documentation, including System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Help evaluate security solutions to ensure compliance with requirements for processing classified information. Assist with configuration management (CM … for security-related software, hardware, and firmware. Maintain records of workstations, servers, routers, firewalls, network switches, and other devices, including system upgrades. Develop and maintain documentation for C&A in accordance with ODNI and DoD policies. Ensure compliance with system security policies and maintain the operational security posture of assigned systems or programs. Support the InformationMore ❯
United States Citizenship and position appropriate security clearance is required. (e.g. Active TS/SCI security clearance with agency appropriate polygraph). Capabilities Provides aid to the program, organization, system, or enclave's information assurance program. Lends assistance for proposing, coordinating, implementing, and enforcing informationsystems security policies, standards, and methodologies. Maintains operational security posture … for an informationsystem or program to ensure informationsystems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the informationsystem and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for … processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for informationsystem security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and More ❯
DDC Innovation & Growth is seeking a part-time InformationSystem Security Officer (ISSO) to support the United States Court of Appeals for the Armed Forces (USCAAF) in Washington, DC. This position requires on-site support and offers an opportunity to lead cybersecurity and risk management efforts in alignment with Department of Defense (DoD) and Federal … RMF) Manage the full RMF lifecycle per DoDI 8510.01, including the use of Enterprise Mission Assurance Support Service (eMASS) for all A&A documentation. Prepare, submit, and maintain complete system authorization packages to achieve and maintain Approval to Operate (ATO) status. Technology Vetting Develop and enforce a technology review process for all new software, hardware, and cloud services. Validate … compliance with the DoD Approved Products List (APL) and assess potential cybersecurity risks prior to implementation. Configuration & System Hardening Maintain and document the authorized hardware/software baselines. Participate in the Configuration Control Board (CCB) and ensure all changes are properly vetted, tested, and approved. Implement and maintain configurations per DISA STIGs and Security Requirements Guides (SRGs). Continuous More ❯
to advanced security concepts. Key Responsibilities: Lead cybersecurity efforts for classified systems, ensuring compliance with Risk Management Framework (RMF) policies and procedures. Assist the InformationSystem Security Manger (ISSM) to maintain the operational security posture to ensure informationsystems (IS), security policies, standards, and procedures are established and followed. Develop, implement, and monitor … security programs, including System Security Plans (SSPs), Risk Assessment Reports, and Security Controls Traceability Matrix (SCTM). Perform vulnerability/risk assessments, continuous monitoring, and self-inspections to ensure compliance and mitigate risks. Maintain operational security posture, oversee security documentation, and coordinate with stakeholders for accreditation and change management. Mentor junior staff, improve cybersecurity processes, and provide subject matter … expertise on advanced technologies. Collaborate with system administrators and engineers to enhance policies, processes, and risk mitigation strategies. Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level. Document and escalate incidents (including event's history More ❯
Must be a US Citizen Must have TS/SCI clearance w/active polygraph Bachelor's degree in Computer Science, Information Assurance, Information Security System Engineering, or a related discipline. Must have a minimum of fourteen (14) years of experience performing in an ISSE role or similar. DoD 8570 compliance with IASAE Level … experience with Defense in Depth Principals/technology including access control, authorization, identification and authentication, public key infrastructure, network and enterprise security architecture and applying risk assessment methodology to system development. Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience. Must have experience applying Risk Management Framework. Must have experience … such as assessing and auditing network penetration testing, anti-virus planning assistance, risk analysis, and incident response. Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass the development, design, and implementation. Experience with penetration testing tools. Experience with scripting languages $140,000 - $265,000 a year More ❯
Location Chantilly, Virginia Full-Time/Part-Time Full-Time Minimum Clearance TS/SCI with Polygraph Timeline Pipeline Description Assertive Professionals is seeking an InformationSystem Security Engineer (ISSE) with Poygraph supporting our National Security Customer in Chantilly, VA. This is a pipeline position. Annual base compensation is $165,000 with either a $10,000 sign … into usable solutions. Prepare and maintain documentation for specified networks that provide a reference for users to understand the established restrictions associated with those specific networks. Develop and maintain System Security Plans (SSP) to meet ongoing security requirements. Ensure approved SSPs are kept up to date as changes are made to the networks. Implement security requirements and ensure compliance … with the client's InformationSystem Security Manager (ISSM) approved SSPs for all networks. This includes: establishing or utilizing existing access control mechanisms; defining and configuring the appropriate firewall settings; conducting intrusion detection and prevention; conducting vulnerability scanning; conducting anti-virus management; and conducting the necessary incidence response actions in accordance with client security policies. More ❯
InformationSystems Security Manager (ISSM) Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 25% Type of Travel: Continental US Exciting Career Opportunity: Join Our Elite Cyber Security Team as an InformationSystems Security Manager! Are you a … seasoned cyber security expert looking for your next thrilling career challenge? CACI is on the hunt for an experienced InformationSystems Security Manager to join our dynamic cyber security team. If you thrive in a mission-driven environment and are passionate about safeguarding critical systems, we want to hear from you! Responsibilities: As our InformationSystems … CISM, GSLC, CCISO). Education: B.S. in Information Technology/Systems, Computer Science, Computer Engineering, or Electrical Engineering. Experience: 5-7 years of related experience. Understanding of system controls and their impact on system security. Minimum of 5 years monitoring system NIST compliance using workflow tools. Minimum of 3 years using eMASS for systemMore ❯