Washington, Washington DC, United States Hybrid / WFH Options
Procession Systems
issues. Review with Tier 2 and 3 triaged cases/escalated tickets (ServiceNow/GitHub/Zenhub) with a sense of urgency. Support accurate Incident and Request Managementinformation in tickets. Review and give feedback on VEText Knowledge Base articles (Microsoft Sharepoint) and case response templates based on user feedback. Work with Tier 2 and … received, how many were resolved according to established time frames, and outstanding cases. Work with VEText end-users on issues that include but not limited to: administration workflows and system updates, documentation or user interface issues and perform problem resolution with wider VEText support team. Monitor major issues and initiate communications to necessary teams including communication with the VEText More ❯
is to accelerate operations through data and new analytical insights. The entire section leverages agile and works to provide enhanced reporting and global searching capabilities to facilitate task management, cross-utilization, and address national intelligence priorities while protecting confidential data and sources. The Cloud Developer (Mid) is a part of a team that will lead large scale data … customer facility. Requirements: Active Top Secret with SCI eligibility Minimum of 10 years of experience with 3 years of related technical specialized experience Education: Bachelor's Degree in InformationSystems Engineering, Computer Science, Engineering, Business or other related field In absence of degree, additional years of experience may be substituted for educational requirements Preferred: Amazon Web Services Microsoft More ❯
critical applications. Network Monitoring and Troubleshooting: Proactively monitor network performance, identify potential issues, and implement solutions. Utilize tools for network analysis and diagnostics to resolve problems swiftly. Security Management: Implement and maintain robust security measures to protect the network infrastructure. Regularly assess and update security protocols and practices to safeguard sensitive data and voice communications. Documentation and Reporting … and new technologies. Training and Development: Conduct training sessions for team members on network operations, troubleshooting techniques, and security protocols. Qualifications Required: Bachelor's degree in Computer Science, Information Technology, or a related field. Minimum of 10 years of experience in network engineering, with a … strong emphasis on Cisco environments. Experience in a 9-1-1 or public safety setting is required. Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements In-depth knowledge of Cisco routers, switches, and firewalls. Proficient in network protocols (BGP, OSPF, EIGRP, MPLS). Experience More ❯
Reconnaissance (C4ISR), and Mission Management. In Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) solutions, you'll help develop systems that sense, control, exploit and disseminate actionable information to warfighters supporting a variety of missions. An exciting future at BAE Systems awaits and it starts with Year One: Beyond exciting work, every new engineer will be part … dedicated to supporting you and your first steps in your engineering career. Please note that pursuant to a government contract, this specific position requires US Person status Pay Information: Salary Range: $62,810 - $100,540 Please note: This range is based on our market pay structures. However, individual salaries are determined by a variety of factors including, but … Docker Jenkins Nexus Database frameworks Elasticsearch Redis SQL PostgreSQL Quarkus MongoDB Front End Development tools ReactJS Vue SASS CSS HTML Node Nginx Web Socket Jest Angular JavaScript Pay Information Full-Time Salary Range: $64723 - $103557 Please note: This range is based on our market pay structures. However, individual salaries are determined by a variety of factors including, but More ❯
Chantilly, VA Full-Time TS/SCI with Polygraph Onsite Join Our Mission Lucayan Technology LLC is looking for an InformationSystems Security Engineer (ISSE) with Space Systems experience to join our growing cybersecurity team in Chantilly, VA. In this role, you will be instrumental … in safeguarding mission-critical systems, applying your expertise in ICD 503 compliance, secure systems design, and information assurance engineering. What You'll Do Conduct informationsystem security engineering throughout the lifecycle, from acquisition to operations. Integrate security requirements into system design and development using systems engineering methodologies. Collaborate with government stakeholders to ensure compliance … with ICD 503 certification and accreditation. Provide hands-on expertise with networks, virtualization platforms, and enterprise operating systems. Lead or support technical activities in system integration, configuration management, and testing Participate in space system security requirement reviews, working groups, and national-level security councils. Prepare and maintain security documentation, including System Security Plans (SSPs), CONOPS More ❯
CA. The ISSE III plays a critical role in securing mission-critical systems for the U.S. Navy. This senior-level position involves leading cybersecurity engineering efforts across the full system lifecycle, ensuring compliance with federal cybersecurity standards, and supporting Risk Management Framework (RMF) activities. Education and Experience: • Bachelor's Degree in computer science, information technology … certification requirement: CASP+ CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, CCSP. Essential Duties: The candidate will be responsible for: • Security Architecture & Engineering: o Design and implement secure system configurations. o Develop and maintain security documentation (SSPs, SARs, RARs). o Conduct threat modeling and vulnerability assessments. • RMF & Compliance: o Execute RMF Steps 0-6 including POA&M … o Tailor and implement security controls per NIST SP 800-53 Rev 5, DoDI 8510.01, and NAVSEA policies. o Utilize tools like eMASS, ACAS, HBSS, VRAM, SCC, and SCAP. • System Support & Documentation: o Develop and review technical manuals, installation guides, and training materials. o Support configuration management and change control processes. o Perform routine audits and patch More ❯
Warfare, and Sensors (PEO IEW&S). The ISSO will assist in safeguarding DoD informationsystems, ensuring cybersecurity compliance, and implementing DoD cyber policies and standards throughout system lifecycles. This position requires deep knowledge of cybersecurity principles, DoD cybersecurity documentation, and proactive risk management in support of secure system integration and sustainment. Responsibilities: Support … reports from penetration tests, static code analysis, and vulnerability scans. Analyze network architecture, data flows, organizational charts, and personnel assignments for potential cybersecurity vulnerabilities. Participate in continuous improvement of system security postures and assist in securing custom-developed applications. Perform other duties as assigned. Required Skills: Strong understanding of DoD cybersecurity regulations, standards, and tools. Experience with RMF, vulnerability … management, system hardening, and secure coding practices. Excellent communication and coordination skills across functional teams. Ability to assess, document, and mitigate cybersecurity risks in complex environments. U.S. Citizenship and active Top Secret/SCI clearance with CI Poly. Required Experience: DoDM 8140.03 Work Role Code 722 (InformationSystems Security Manager), Intermediate Level. At least More ❯
the world are counting on us to deliver. Join the transformation and help us make this impact now. BlueHalo, an AV Company, is seeking a strong InformationSystem Security Officer to join the team and provide aid to the program, organization, system, or enclave's information assurance program. In this position the individual will … for the details and apply to make the most out of your career. You'd like to do this Assist security authorization activities in compliance with InformationSystem Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Assists with the management of security aspects of the informationsystem … to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Maintain operational security posture for an informationsystem or program to ensure informationsystems security policies, standards, and procedures are established and followed. Manage changes to system and assesses the security impact of those More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for … application of security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program lifecycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking … operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication and authorization; systemMore ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validate and verify system security requirements definitions and analysis, and establish system security designs. Design, develop, implement, and/or integrate IA and security systems and system components, including those for … and differing data protection/classification requirements. Support the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the program life cycle. Apply system security engineering expertise in one or more of the following: System security design process Engineering life … cycle Information domain Cross-domain solutions COTS and GOTS cryptography Identification, authentication, and authorization System integration Risk management Intrusion detection Contingency planning Incident handling Configuration control and change management Auditing Certification and accreditation processes Minimum Qualifications 20 years of experience as an InformationSystems Security Engineer Versed in principles of lA More ❯
MANTECH seeks a motivated, career and customer-oriented Senior InformationSystem Security Officer (ISSO) to join our team in Huntsville, AL. Responsibilities include, but are not limited to: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS and that selected security controls are implemented and … operating as intended during all phases of the IS lifecycle. Provide liaison support between the system owner and other IS security personnel. Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis; Conduct required IS vulnerability scans according to risk assessment parameters. Manage the risks to ISs and other FBI assets by coordinating … appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions. Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO); Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase. More ❯
our shareholders. Join our team and discover why we are a top veteran employer and Certified Great Place to Work ASRC Data Networx is seeking an InformationSystem Security Manager (ISSM) for our Cybersecurity System Support (CPSS) contract with a Federal Government Agency. We will provide support to a Cybersecurity Division to leverage proven and successful … Risk Management Framework and all related department and agency policies/procedures Audit security systems to ensure compliance to applicable security controls from NIST 800-53 Review System Security and Privacy Plan (SSPP) within CSAM including control implementation statements Provide quality assurance of all security documentation, including risk acceptance requests, that supports assigned system Final review … of all authorization documents for assigned systems Primary liaison between product teams/system owners and the Chief Information Security Officer We invest in the lives of our employees, both in and out of the workplace, by providing competitive pay and benefits packages. Benefits offered may include health care, dental, vision, life insurance; 401(k); education assistance More ❯
space exploration, hypersonic and nuclear deterrence and warfighter readiness. Visit for more details. Responsibilities Arcfield's Cyber programs are expanding and are currently in need of InformationSystem Security Engineer (ISSE) Level 3/SME professionals to provide ISSE lifecycle support to our Chantilly VA customer and will be responsible for capturing and refining information … Documenting and maintaining Customer-specific ISSE processes and procedures Applying software engineering methodologies, security engineering principles, and secure coding techniques Coordinating activities with Authorization and Accreditation stakeholders throughout the system lifecycle Qualifications Required: Must possess and be able to maintain a TS/SCI clearance with polygraph BS 12-15, MS 10-13, PhD 10+ A STEM degree … techniques Coordinate activities with A&A stakeholders Knowledge of and experience with: ICD 503 and the Government's certification and accreditation process Networks, computer components, protocols, and COTS technology System methodologies including client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers SW integration of COTS and GOTS products Virtualization More ❯
Job Title: InformationSystem Security Engineer I (ISSE I) Location(s): Annapolis Junction, MD Hours: Regular Full-Time Salary Range: $120k/yr - $175k/yr Clearance Requirements: This position requires a current and active TS/SCI with Full Scope Poly at the time of application. What you will be doing: The contractor shall provide cyber … security and security engineering services for the Fort Meade customer including system security engineering, cybersecurity risk assessments, and security architecture support. The ISSE shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established cybersecurity standards and regulations and recommended mitigation strategies. This includes: Participate as a security engineering representative on … engineering teams for the design, development, implementation, and/or integration of: Secure networking, computing, and enclave environments Cybersecurity architectures, systems, or system components Supports the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures Applies knowledge of cybersecurity policy, procedures, and workforce structure to design, develop, and implement secure networking More ❯
the proposal, coordination, implementation, and enforcement of security policies, standards, and methodologies. Responsibilities: The candidate will be responsible for managing the operational security posture of an InformationSystem, ensuring compliance with established policies, procedures, and standards. In this role, the candidate will work closely with InformationSystem Security Engineers (ISSEs) and InformationSystem Security Officers (ISSOs) to evaluate security solutions and assess their effectiveness in protecting classified information. The candidate will also manage vulnerability and risk assessments, as well as contribute to security authorization activities, including preparation and review of critical documentation such as System Security Plans (SSPs), Risk Assessment Reports, and Certification and Accreditation (C&A) packages. … management (CM) processes, ensuring that security software, hardware, and firmware are up-to-date and secure. Additionally, they will be responsible for assessing the security impact of system changes and providing support in line with the Risk Management Framework (RMF) and DoD Information Assurance Certification and Accreditation Process (DIACAP). This position offers More ❯
Data Intelligence LLC (DI) is searching for a full-time Assistant InformationSystem Security Officer (AISSO) to work in Washington, DC. The Assistant InformationSystem Security Officer (AISSO) will provide comprehensive Risk Management Framework (RMF) support across various systems and environments, under the guidance of the ISSO and in alignment with DoD … MS Office or Visio formats. - Coordinate with Red and Blue Teams on vulnerability assessments and incident response activities. - Assist with technical writing tasks related to security documentation, policies, and system accreditation deliverables. Required Qualifications: - 5-7+ years in related experience - Prior experience with Navy or US Coast Guard RMF/Cyber - Demonstrated understanding of NIST SP 800-series … and RMF lifecycle documentation. Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a More ❯
the proposal, coordination, implementation, and enforcement of security policies, standards, and methodologies. Responsibility: The candidate will be responsible for managing the operational security posture of an InformationSystem, ensuring compliance with established policies, procedures, and standards. In this role, the candidate will work closely with InformationSystem Security Engineers (ISSEs) and InformationSystem Security Officers (ISSOs) to evaluate security solutions and assess their effectiveness in protecting classified information. The candidate will also manage vulnerability and risk assessments, as well as contribute to security authorization activities, including preparation and review of critical documentation such as System Security Plans (SSPs), Risk Assessment Reports, and Certification and Accreditation (C&A) packages. … management (CM) processes, ensuring that security software, hardware, and firmware are up-to-date and secure. Additionally, they will be responsible for assessing the security impact of system changes and providing support in line with the Risk Management Framework (RMF) and DoD Information Assurance Certification and Accreditation Process (DIACAP). This position offers More ❯
This position is contingent on contract award Description: Provide support for a program, organization, system, or enclave's information assurance program. Provide support for proposing, coordinating, implementing, and enforcing informationsystems security policies, standards, and methodologies. Maintain operational security posture for an informationsystem or program to ensure informationsystems … security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the informationsystem and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configuration … management (CM) for informationsystems security software, hardware, and firmware. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in More ❯
This position is contingent on contract award Description: Provide support for a program, organization, system, or enclave's information assurance program. Provide support for proposing, coordinating, implementing, and enforcing informationsystems security policies, standards, and methodologies. Maintain operational security posture for an informationsystem or program to ensure informationsystems … security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the informationsystem and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configuration … management (CM) for informationsystems security software, hardware, and firmware. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in More ❯
a Journeyman Information Security Analyst at Cherokee Nation Systems Solutions (CNSS) in Washington, DC, you will play a pivotal role in ensuring the security and functionality of system platforms. You will collaborate with upper management to determine acceptable levels of risk for enterprise computing platforms. Compensation & Benefits: Estimated Starting Salary Range for Information … control is correctly implemented and operated as designed. Provide support to ad-hoc IT Assessments to include but not limited to critical IT controls (CIC), Financial and related financial system ATOs, Accounting Treatment Manual Assessment and Testing (ATM), etc. Collaborate with cross-functional teams to integrate security requirements into system planning, fieldwork, and reporting. Work general supervision, relying … education includes a bachelor's degree in a business field, systems engineering, computers, or other related fields. Minimum experience includes having two (2) years of government IT financial or system testing, including one year of federal internal controls ITGC experience. Knowledge of Federal and Department of Homeland Security (DHS) policies and guidance, OMB A-123 attachment R-4300A, DISA More ❯
implements the necessary controls and procedures to cost-effectively protect informationsystems assets from intentional or inadvertent modification, disclosure, or destruction. • Monitors security of electronic data, applications system usage, networks, and physical environment. • Provides guidance and direction for the physical and virtual protection of informationsystems assets to other functional units. • Supports all aspects of … to ensure they meet security requirements for processing up to classified information and supervise and/or maintain the operational security posture for an informationsystem or program. • More senior specialists may assist or develop system security policy and ensure compliance of change management and configuration control processes. Plan and coordinate the … the confidentiality, integrity, and availability of sensitive information. • Ability to provide technical evaluations of customer systems and assist with making security improvements. • Versed in design of informationsystem contingency plans and other deliverables which maintain appropriate levels of protection and meet time requirements for minimizing operations impact to customer organization as well as Security Authorization and Assessment More ❯
Framework (RMF) efforts in accordance with DoD 8500 Series, NIST SP 800 Series, and other applicable cybersecurity policies and guidelines. Develop, review, and manage technical documentation including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plan of Action & Milestones (POA&Ms). Interface with the Navy Cross Domain Solutions Office (NCDSO) to support secure cross-domain … solutions, including submission packages and coordination of approvals. Provide subject matter expertise in support of system security engineering, integration, and testing. Coordinate with system engineers, developers, and stakeholders to ensure security controls are effectively implemented. Monitor systems for compliance with DFARS Clause and other DoD IA requirements. Assist in the preparation and review of technical instructions, engineering plans … and test-related documentation. Maintain up-to-date knowledge of emerging cybersecurity threats, tools, and regulatory requirements. Support system Certification and Accreditation (C&A) processes in accordance with NSA and DoD standards. Required Qualifications: Education: Master's degree from an accredited college or university in Computer Science, InformationSystemsManagement, Cybersecurity, or a related field. More ❯
This position is contingent on contract award Description: Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing InformationSystem Security policies, standards, and methodologies. Manage operational security posture for an InformationSystem or … program to ensure InformationSystem Security policies, standards, and procedures are established and followed. Provide management of security aspects of the InformationSystem and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage … the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for informationsystem security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System Security Plans More ❯
The ISSO will be responsible for ensuring the confidentiality, integrity and availability of enterprise informationsystems by supporting compliance efforts, assessing security controls, managing risk, and maintaining system authorizations under frameworks such as the NIST Risk Management Framework (RMF). This position plays a vital role in securing IT infrastructure and supporting continuous monitoring and … audit readiness. Essential Duties & Responsibilities: Serve as the primary security point of contact for assigned informationsystems throughout the lifecycle. Develop, maintain, and update security documentation including System Security Plans (SSP), Security Assessment Reports (SAR), and Plan of Action and Milestones (POA&M). Conduct risk assessments, vulnerability scans, and facilitate remediation and migration. Ensure the implementation … and assessment of security controls in accordance with NIST SP 800-53 and other applicable standards. Support the preparation, submission and maintenance of Authorization to Operate (ATO) packages. Monitor system security configurations, audit logs, and patch management for compliance and threat detection. Collaborate with IT staff, system owners, developers, and auditors to ensure security posture aligns More ❯
The ISSO will be responsible for ensuring the confidentiality, integrity and availability of enterprise informationsystems by supporting compliance efforts, assessing security controls, managing risk, and maintaining system authorizations under frameworks such as the NIST Risk Management Framework (RMF). This position plays a vital role in securing IT infrastructure and supporting continuous monitoring and … audit readiness. Essential Duties & Responsibilities: Serve as the primary security point of contact for assigned informationsystems throughout the lifecycle. Develop, maintain, and update security documentation including System Security Plans (SSP), Security Assessment Reports (SAR), and Plan of Action and Milestones (POA&M). Conduct risk assessments, vulnerability scans, and facilitate remediation and migration. Ensure the implementation … and assessment of security controls in accordance with NIST SP 800-53 and other applicable standards. Support the preparation, submission and maintenance of Authorization to Operate (ATO) packages. Monitor system security configurations, audit logs, and patch management for compliance and threat detection. Collaborate with IT staff, system owners, developers, and auditors to ensure security posture aligns More ❯