InformationSystem Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem … personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
InformationSystem Security Officer 2 is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem … personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
TBSE3-000-454) Country Intelligence Group is seeking a full-time Systems Engineer to support our client at Fort Meade, MD in the architecture, design, and implementation of advanced system solutions. The selected candidate will work as part of an Integrated Product Team to translate stakeholder requirements into verified system capabilities, generate alternative system designs, and contribute … to system decomposition, interface definition, and lifecycle planning. Responsibilities include developing and documenting system-level designs, allocating budgets and performance metrics, and ensuring systems meet rigorous information assurance and verification criteria. The role also involves the application of systems engineering principles in accordance with ISO/IEC 15288 process areas. Experience with Apache NiFi development and … to design new capabilities based upon evaluation of all necessary development and operational considerations. • Allocate real-time process budgets and error budgets to systems and subsystem components. • Generate alternative system concepts, physical architectures, and design solutions. • Define the methods, processes, and evaluation criteria by which the systems, subsystems and work products are verified against their requirements in a written More ❯
InformationSystem Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem … personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
InformationSystem Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem … personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
InformationSystem Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem … personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
InformationSystem Security Officer (ISSO 2) is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem … personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
InformationSystem Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem … personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
InformationSystem Security Officer (ISSO) 2 - The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
NMCC InformationSystem Security Engineer (ISSE) Country Intelligence Group is seeking a full-time NMCC InformationSystem Security Engineer (ISSE) to support cybersecurity operations at the Pentagon. The ISSE will manage and maintain key cybersecurity tools such as Tenable Nessus and Trellix ePO (HBSS/ESS) across Windows and Red Hat Linux environments. Responsibilities … include applying DISA STIGs, conducting vulnerability assessments, implementing system hardening measures, and supporting the Risk Management Framework (RMF) process. The ideal candidate has experience with tool administration, system architecture, Tier 3 troubleshooting, and security documentation. A strong understanding of IA integration and secure systems engineering is essential. Tasks Performed: • Security Tool Infrastructure Management: o … backend infrastructure, deployment, patching, tuning, and overall health of security tools, including Tenable Nessus, Trellix ePO (HBSS/ESS), and associated Windows and Red Hat Linux servers. o Monitor system performance, identify bottlenecks, and implement solutions to ensure optimal operation of security tools. o Develop and maintain standard operating procedures (SOPs) for security tool administration. • Vulnerability ManagementMore ❯
InformationSystem Security Officer (ISSO) 2- This is a future position that may come open in the future. We are currently building our pipeline. Responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have … the detailed knowledge and expertise required to manage the security aspects of an informationsystem and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close … coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access More ❯
InformationSystem Security Officer (ISSO) 1 is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem … personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
InformationSystem Security Officer (ISSO) 1 is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem … personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
InformationSystem Security Officer (ISSO) 3 is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem … personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
InformationSystem Security Officer (ISSO) 3 The ISSO 3 is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISSO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an informationsystem and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
InformationSystem Security Officer (ISSO) 1- This is a future position that may come open in the future. We are currently building our pipeline. Responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISSO. The position shall have … the detailed knowledge and expertise required to manage the security aspects of an informationsystem and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close … coordination with the ISSM and ISSO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access More ❯
InformationSystem Security Officer (ISSO) 3 - This is a high priority position we are looking to fill! The ISSO 3 is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge … and expertise required to manage the security aspects of an informationsystem and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the … ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting More ❯
InformationSystem Security Officer (ISSO) 3 is responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position should have the detailed knowledge and expertise required to manage the security aspects of an informationsystem … personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact … in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the informationsystem(s) Conduct periodic reviews of informationsystems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a More ❯
InformationSystem Security Officer (ISSO) 3- This is a future position that may come open in the future. We are currently building our pipeline. Responsible for ensuring the appropriate operational security posture is maintained for an informationsystem and as such, works in close collaboration with the ISSM and ISO. The position shall have … the detailed knowledge and expertise required to manage the security aspects of an informationsystem and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close … coordination with the ISSM and ISO in monitoring the informationsystem(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access More ❯
lifecycle. The IAE is also responsible for capturing and refining information protection requirements to ensure their integration into informationsystems acquisitions and informationsystem development through purposeful security design or configuration. Personnel shall be knowledgeable of best practices when implementing security controls including software engineering methodologies, security engineering methodologies, security engineering principles, and … TS/SCI with CI Polygraph Requirements/Responsibilities: • Knowledge of and experience with ICD 503 and the Government's certification and accreditation process • Proficient with networks, computer components, system protocols, and COTs technology • Knowledge of system methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers … Linux, Unix, Mac OS • Technical experience in configuring and supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configuration management, system maintenance, integration testing, and informationsystem engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services More ❯
lifecycle. The IAE is also responsible for capturing and refining information protection requirements to ensure their integration into informationsystems acquisitions and informationsystem development through purposeful security design or configuration. Personnel shall be knowledgeable of best practices when implementing security controls including software engineering methodologies, security engineering methodologies, security engineering principles, and … TS/SCI with CI Polygraph Requirements/Responsibilities: • Knowledge of and experience with ICD 503 and the Government's certification and accreditation process • Proficient with networks, computer components, system protocols, and COTs technology • Knowledge of system methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers … Linux, Unix, Mac OS • Technical experience in configuring and supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configuration management, system maintenance, integration testing, and informationsystem engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services More ❯
lifecycle. The IAE is also responsible for capturing and refining information protection requirements to ensure their integration into informationsystems acquisitions and informationsystem development through purposeful security design or configuration. Personnel shall be knowledgeable of best practices when implementing security controls including software engineering methodologies, security engineering methodologies, security engineering principles, and … TS/SCI with CI Polygraph Requirements/Responsibilities: • Knowledge of and experience with ICD 503 and the Government's certification and accreditation process • Proficient with networks, computer components, system protocols, and COTs technology • Knowledge of system methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers … Linux, Unix, Mac OS • Technical experience in configuring and supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configuration management, system maintenance, integration testing, and informationsystem engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services More ❯
lifecycle. The IAE is also responsible for capturing and refining information protection requirements to ensure their integration into informationsystems acquisitions and informationsystem development through purposeful security design or configuration. Personnel shall be knowledgeable of best practices when implementing security controls including software engineering methodologies, security engineering methodologies, security engineering principles, and … TS/SCI with CI Polygraph Requirements/Responsibilities: • Knowledge of and experience with ICD 503 and the Government's certification and accreditation process • Proficient with networks, computer components, system protocols, and COTs technology • Knowledge of system methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers … Linux, Unix, Mac OS • Technical experience in configuring and supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configuration management, system maintenance, integration testing, and informationsystem engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services More ❯
Weeghman & Briggs is seeking System Engineers (Level 1 & 2) to join our growing team and support an important mission within the Federal Government. Location: Aurora, Colorado Clearance Required: TS/SCI w/Polygraph System Engineers shall possess the following capabilities: Analyzes user's requirements, concept of operations documents, and high level system architectures to develop system requirements specifications. Analyzes system requirements and leads design and development activities. Guides users in formulating requirements, advises alternative approaches, and conducts feasibility studies. Provides technical leadership for the integration of requirements, design, and technology. Incorporates new plans, designs and systems into ongoing operations. Develops technical documentation. Develops system Architecture and system design documentation. Guides system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans. Interacts with the Government regarding System Engineering technical considerations and for associated problems, issues or conflicts. Ultimate responsibility for the technical integrity of work performed and deliverables associated with the System Engineering area of More ❯
InformationSystem Security Engineer (ISSE) 3 is primarily responsible for conducting informationsystem security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into informationsystems … the development team designing and developing organizational informationsystems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an informationsystem including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position's main function is working within Special Access Programs … to-day" support for Collateral, Sensitive Compartmented Information (SCI) and SAP activities. Duties may include : Perform oversight of the development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize More ❯