an experienced and skilled ISSE for a DoD program in McLean, VA. This position is hands-on technical and will provide on-site security engineering, systems administration, and information assurance support to the program. Clearance Requirements: An active Secret is required, Top Secret is preferred. Candidates who do not meet these clearance requirements will not be considered. Responsibilities … of Cisco ISE/Forescout CounterACT NAC technologies preferred. • Perform Site-Lead/Management duties that support the workflow and project goals for a small team of System Administrators and Information Security Engineers. • Provide senior-level security engineering and development support throughout the system life cycle. • Perform appropriate continuous monitoring and systems security testing … using tools such as Nessus Security Center/ACAS, Trellix, and Splunk Enterprise. • Provide mitigation solutions for identified findings and patching requirements. • Ensure that proposed system changes are reviewed and that implemented system modifications do not adversely impact the security of the system. (e.g., Change Management) • Maintain local Trellix/ENS installations and upstream connections. • Work More ❯
and mission capabilities to DTRA's internal and external mission partners operating in CONUS and OCONUS locations. Primary Responsibilities Continuous upkeep, monitoring, analysis, and response to InformationSystem, network and security events. Maintaining the NIPR and SIPR RMF packages for all enclaves within scope of the contract. Documents compliance actions within the approved automated compliance tracking system Ensures systems are operated, maintained, and disposed of in accordance with internal security policies and practices outlined in the System Security Plan (SSP), Standard Operating Procedures (SOP), and customer directives. Ensures records are maintained for workstations, servers, software, routers, firewalls, network switches, crypto, and other relevant hardware/equipment throughout the informationsystem's life … cycle. Evaluates proposed changes or additions to the informationsystem and advises senior site leadership of the security relevance. Participates in internal/external security audits/inspections; performs risk assessments and Continuous Monitoring. Ensure proper protection and/or corrective measures have been taken when an incident or vulnerability has been discovered Working with the Facility More ❯
MANTECH seeks a motivated, career and customer-oriented Senior InformationSystem Security Officer (ISSO) to join our team in Washington, D.C Responsibilities include, but are not limited to: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS and that selected security controls are implemented and … operating as intended during all phases of the IS lifecycle Provide liaison support between the system owner and other IS security personnel Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis; Conduct required IS vulnerability scans according to risk assessment parameters Manage the risks to ISs and other FBI assets by coordinating … appropriate correction or mitigation actions and oversee and track the timely completion of (POAMs). Coordinate system owner concurrence for correction or mitigation actions Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO); Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Tyto Athene, LLC
authorization packages in accordance with the client's requirements and the agency's adoption of NIST and RMF. Core documents that the candidate will be responsible for are the System Security Plan, Risk Assessment Report, Security Assessment Plan and Report, Contingency Plan, Incident Response Plan, Standard Operating Procedures, Plan of Actions and Milestones, Remediation Plans, Configuration Management … maintain the Plan of Action and Milestones and support remediation activities to include the continuous monitoring process Maintain an inventory of hardware and software for the informationsystem security boundary Develop, coordinate, test, and train on Contingency Plans and Incident Response Plans Perform risk analyses to determine cost-effective and essential safeguards Support Incident Response and Contingency … of the application, network, and database Provide continuous monitoring to enforce client security policy and procedures and create processes that will provide oversight into the following activities for the system owner. Coordinate with multiple stakeholders to complete mandatory agency data calls in a timely manner Conduct Privacy Threshold Analyses (PTAs) and Privacy Impact Assessments (PIAs), Remain current with new More ❯
You will ensure that systems and organizational databases are protected from unauthorized access and use, and monitor systems, identify threats, and handle disaster recovery operations. Utilizes detailed knowledge of system functions, security policies, technical security safeguards, and operational or procedural security measures commonly used to implement NIST SP 800-53 security controls. What You'll Be Doing: Perform assessments … required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Contribute to and potentially lead the planning and implementation of large programs in the function, and regularly interfaces … communication skills Ability to Mentor, provide guidance and instructional aide to Mid-level and Junior ISSOs Familiarity with conducting research and analysis. Familiarity with network and informationsystem security principles and best practices. Familiarity with controlling, labeling, virus scanning, and appropriately transferring data (uploading/downloading) between informationsystems at varying classification levels. Ability to More ❯
passion for keeping pace with rapidly evolving technology advancements and leveraging your knowledge on a highly collaborative team to deliver state-of-the-art capabilities. The InformationSystem Security Engineer (ISSE) designs, implements, and manages security solutions for information systems. Their responsibilities include ensuring systems meet security standards, conducting risk assessments, and recommending mitigation strategies. … standards, such as NIST, RMF, and ICD 503. • Vulnerability Management: Conducting vulnerability scans, analyzing results, and recommending remediation actions. • Security Documentation: Creating and maintaining security documentation, including system security plans, security assessment reports, and risk management plans. • Collaboration and Communication: Working closely with system administrators, network engineers, software developers, and other stakeholders to integrate … security into the system development lifecycle. • Continuous Monitoring: Participating in continuous monitoring activities to ensure ongoing security posture and compliance. • Incident Response: Participating in incident response activities, including investigating security incidents, analyzing malware, and implementing forensic analysis. Required qualifications to be successful in this role: • Education and/or Experience: Bachelor's degree and/or 5 to More ❯
Overview Provide cyber security support for informationsystems, from Assessment and Authorization through Operations and Maintenance. This includes applying Risk Management Framework expertise and supporting developers and engineers in maintaining Authority to Operate compliance for information systems. Required Qualifications Support the assessment … and authorization by applying expert-level knowledge of NIST SP 800-53 (Revision 4 and Revision 5). Draft security documentation, including Plan of Actions and Milestones (POA&Ms), System Security Plans (SSPs), and other designated artifacts for the Body of Evidence (BOE). Participate in project review meetings and provide technical cyber security guidance. Refine, edit, and maintain … training materials, including maintenance of a small training/demonstration network, execute training class. concerning malicious code threats and assist in preparation of a daily report to senior management on the current status of a threat and ability to counteract that threat. Write reports for Sponsor on the detailed technical analysis results. Communicate complex technical concepts and project More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Lockheed Martin
We are looking for a Classified Cyber Security/InformationSystems Security Manager (ISSM) for an exciting opportunity to lead a team of 18 InformationSystem Security Officers (ISSO) within the RMS classified cybersecurity group. The position is located in Colorado Springs, CO and will support multiple Department of Defense (DoD) programs. The selected candidate … will guide and mentor the ISSO team to ensure compliance through the implementation of mandatory informationsystem security tasks on assigned informationsystems utilizing various government guidance publications (e.g., NISPOM, DoD 8500 series, NIST, CNSSI, DAAPM, etc.) in support of development and operations. Responsibilities of the InformationSystem Security Manager (ISSM) include … but are not limited to: • Overseeing and directing day-to-day informationsystem security operations, providing expert guidance on all technical security matters as the ISSM. • Attracting, retaining, and developing top cyber talent to ensure a skilled and effective classified cyber security team. • Coordinating and managing interactions with government authorization authorities to facilitate and maintain 100% active More ❯
Assessment & Authorization (A&A), execution of Continuous Monitoring Plans, and facilitation of Security Controls Assessments. Administer and monitor Risk Management Framework (RMF) steps and activities throughout the system lifecycle to maintain an appropriate security posture. Implement cybersecurity programs, policies, and procedures for assigned systems. Maintain working knowledge of current and upcoming events, system functions, policies, safeguards … and processes. Coordinate with applicable stakeholders across the enterprise to ensure security compliance and readiness. Maintain Authorization to Operate (ATO) packages for assigned systems within the designated A&A System of Record (e.g., eMASS, XACTA 360, Keystone). Review and analyze audit logs (e.g., Splunk, Windows EVTX, Linux syslogs) to detect potential anomalies or threats. Perform validation checks to … compliance/vulnerability scans and manual checks to identify and mitigate risks. Execute ISSO-specific tasks as outlined in program security plans. Deliver cybersecurity education, training, and awareness to system users as required by the ISSM. Basic Qualifications: Active Top Secret clearance with SCI eligibility. Bachelor's degree in Cybersecurity, InformationSystems, or related discipline, and/ More ❯
Information Assurance, IAVA, System Security Plans (SSPs), RMF, Windows, Linux, Authorization to Operate, Verification and Validation, Security+, Security X, CASP+, NIST 800-53 Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI … last five (05) years). At least twelve (12) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, Information Security, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar processes may be substituted for a … Security+ Certification or Security X (previously known as the CASP+) Certification required Must have experience as ISSO working independently, and/or on teams maintaining secure informationsystem operations in isolated, connected and standalone environments. Must have at least five (05) years of experience using tools to support IAVA management. Must have at least five (05) years More ❯
experience, certifications, industry training and more. Join us to drive positive, lasting change that moves missions and the government forward! Accenture Federal Services is seeking an InformationSystem Security Officer (ISSO) to apply cybersecurity and Risk Management Framework (RMF) experiences to Amazon Web Service (AWS) cloud platform, to include infrastructure, applications, data, and people. If … with engineering and networking teams on the cloud platform's deployment What You'll Need: 5 years of experience implementing NIST 800-53, Rev 4 and the Risk Management Framework (RMF) 5 years of experience with Windows and/or Linux environments 5 years of experience using information security and assurance practices and principles 5 years … factors, including but not limited to office location, role, skill set and level of experience. Accenture Federal Services offers a wide variety of benefits. You can find more information on benefits here. We accept applications on an on-going basis and there is no fixed deadline to apply. The pay range for the states of California, Colorado, Hawaii More ❯
ManTech seeks a motivated, career and customer-oriented Senior Computer and InformationSystems Manager to join our team in DC, Maryland, and Virginia (DMV) area. In this role you will plan, direct, or coordinate activities in such fields as network design and implementation, network device troubleshooting, data processing, informationsystems, systems analysis, and computer programming. The … Computer and InformationSystems Manager is recognized as an expert in the areas of network device interoperability, cyber security processes, and the protection of technical architecture. They lend thought leadership and advice to engagement teams in developing creative solutions to client problems. The individual is responsible to oversee, lead, and manage IT troubleshooting, management, technical refresh … Analyze, review, recommend changes as appropriate for processes to keep technology and processes efficient and aligned with mission, laws, regulations, and policies Minimum Qualifications: Bachelor's Degree in Information Technology, Computer Science, ManagementInformationSystems or a related field and 10+ years of related experience Previous Network Operations Center (NOC) or IT Operations experience More ❯
features, develop reporting, define best practice business processes and maintain strong security controls. With a strong functional understanding of budgeting, forecasting, and strategic planning activities, the position provides strategic system guidance and expertise to support and optimize Adaptive Planning for internal Finance and campus stakeholders. Position acts as a liaison between InformationSystems and supported units, particularly … models and dimensions. Analyzes and documents business processes and needs, understands the scope of modifications, creates effective design specifications, and participates in the development and testing/evaluation of system design, integration and reporting efforts. Provides project management expertise for supported units for system implementations and business process enhancements. Develops detailed plans, ensures targets are being … well as other external systems) to ensure that data is flowing efficiently and correctly between the systems. Performs data clean-up activities when data becomes out of sync. Evaluates system impact as a result of available upgrades, including patches/fixes, and business change requests. Leads discussions with users to assist them with understanding impacts and how to appropriately More ❯
Description Position Title : InformationSystems Security Officer (ISSO)/InformationSystems Security Manager (ISSM) Location : Arlington, VA (Remote) Clearance Level : Secret Responsibilities will include, but are not limited to : Ensure cybersecurity is integrated in all phases of the lifecycle sustainment and proactively support the Government's efforts to maintain, update and continuously monitor Chief of Staff … CoS) application's security posture, in accordance with the Risk Management Framework (RMF). Ensure cybersecurity is integrated in all phases of the lifecycle sustainment and proactively support the Government's efforts to maintain, update and continuously monitor Chief of Staff (CoS) application's security posture, in accordance with the Risk Management Framework (RMF). Identify … and authorization requirements. Qualifications Required qualifications Bachelor's Degree in related field of study or equivalent experience. Minimum of three years of experience, one within DoD. Certifications: Certified InformationSystems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified InformationSystems Auditor (CISA), CompTia Security +, Certified in Risk and InformationSystemsMore ❯
the Ft. Meade, MD customer. Our work locations range from North and South Laurel, Columbia, Annapolis Junction, Linthicum and Ft. Meade, MD. ISSO Job Summary: The InformationSystem Security Officer (ISSO) is integral to our mission of safeguarding our information systems. The ISSO collaborates with cross-functional teams to develop and maintain a robust security … they meet requirements for processing classified information and perform vulnerability/risk assessments to support certification and accreditation. Provide configuration management for informationsystem security software, hardware, and firmware, and manage changes to systems, assessing their security impact. Prepare and review security documentation, including System Security Plans (SSPs) and Assessment and Authorization … ensuring they are resilient against threats and vulnerabilities. This role requires a deep understanding of security engineering principles and a proactive approach to risk management throughout the system lifecycle. Primary Responsibilities: Perform and review technical security assessments to identify vulnerabilities and ensure compliance with information assurance (IA) standards and regulations. Validate and verify systemMore ❯
System Administrator GES is seeking a skilled Systems Administrator to join the I3TS team supporting DTRA. The I3TS program provides enterprise-wide IT support to enable DTRA's InformationManagement & Technology Directorate (ITD) to consolidate, modernize, and continuously innovate the delivery of IT services and mission capabilities to DTRA's internal and external mission partners … operating in CONUS and OCONUS locations. The candidate will be responsible for ensuring the security and integrity of IT systems by applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerability management processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will … The candidate must be able to work in a high-energy environment and adapt to shifting priorities. Key Responsibilities Continuous upkeep, monitoring, analysis, and response to InformationSystem, network and security events. STIG Application and Compliance: o Implement and maintain Security Technical Implementation Guides (STIGs) across various systems and applications. o Conduct regular STIG compliance checks using More ❯
IMPACT Participation in iterative software development teams with adherence to all reporting requirements. Meeting with stakeholders, analyzing requirements, user stories, and related artifacts to determine technical specifications for the system environments. Coordinating with technical teams responsible for the cloud hosting infrastructures in order to establish and maintain the environments used by the program for the development, test, and deployment … Maintain environments at the latest security posture. Environment and Server layout and configuration maintenance to Industry standards and best practices. Remediate app/package installations. Rapid prototyping to refine system requirements and technical specifications of the system and its operating environments. Experience in cloud application (Azure/AWS) architecture. Experience in developing enterprise and solution-level architectural designs. … code design, management, and version control techniques. Exposure to project management skills and/or project-based work structures, project lifecycle models, etc. Knowledge of system and software quality assurance best practices and methodologies. Confidence and experience with AWS Cloudformation. Strong communication and documentation skills. Technical experience with large scale system integration. Build, migrate More ❯
Cloud System Administrator - Secret - Huntsville, AL Level E4/E5 MASC-F Job Location: Redstone Gateway 4122 Rideout Rd, Huntsville, AL (Hybrid - 2 days a week in office W/TH) Clearance: Secret (must be current and active) Relocation: Will consider candidates willing to relocate Compensation: Level E4 - 140-150K (9 years' experience); Level E5 150-170K … years' experience. Job Description Our Client seeking a highly motivated and experienced Cloud System Administrator to join our dynamic MASC-F (Missile and Space Command - Force) team in support of the Missile Defense System. You will be responsible for ensuring vulnerability remediation and security management (system hardening, log management, configuration management (i.e. … Demonstrated experience in one or more of the following: Linux Servers, DNS servers, Domain controllers, network storage devices and Client or Dell servers 3 Years' experience with Linux Operating System Administration (i.e., RHEL8, etc.) Demonstrated experience designing, configuring, and installing informationsystems such as routers, servers, switches, storage systems and laptops. Typically has 9 years' experience in More ❯
lifecycle. The IAE is also responsible for capturing and refining information protection requirements to ensure their integration into informationsystems acquisitions and informationsystem development through purposeful security design or configuration. Personnel shall be knowledgeable of best practices when implementing security controls including software engineering methodologies, security engineering methodologies, security engineering principles, and … TS/SCI with CI Polygraph Requirements/Responsibilities: • Knowledge of and experience with ICD 503 and the Government's certification and accreditation process • Proficient with networks, computer components, system protocols, and COTs technology • Knowledge of system methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers … Linux, Unix, Mac OS • Technical experience in configuring and supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configuration management, system maintenance, integration testing, and informationsystem engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services More ❯
lifecycle. The IAE is also responsible for capturing and refining information protection requirements to ensure their integration into informationsystems acquisitions and informationsystem development through purposeful security design or configuration. Personnel shall be knowledgeable of best practices when implementing security controls including software engineering methodologies, security engineering methodologies, security engineering principles, and … TS/SCI with CI Polygraph Requirements/Responsibilities: • Knowledge of and experience with ICD 503 and the Government's certification and accreditation process • Proficient with networks, computer components, system protocols, and COTs technology • Knowledge of system methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers … Linux, Unix, Mac OS • Technical experience in configuring and supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configuration management, system maintenance, integration testing, and informationsystem engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services More ❯
lifecycle. The IAE is also responsible for capturing and refining information protection requirements to ensure their integration into informationsystems acquisitions and informationsystem development through purposeful security design or configuration. Personnel shall be knowledgeable of best practices when implementing security controls including software engineering methodologies, security engineering methodologies, security engineering principles, and … TS/SCI with CI Polygraph Requirements/Responsibilities: • Knowledge of and experience with ICD 503 and the Government's certification and accreditation process • Proficient with networks, computer components, system protocols, and COTs technology • Knowledge of system methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers … Linux, Unix, Mac OS • Technical experience in configuring and supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configuration management, system maintenance, integration testing, and informationsystem engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services More ❯
lifecycle. The IAE is also responsible for capturing and refining information protection requirements to ensure their integration into informationsystems acquisitions and informationsystem development through purposeful security design or configuration. Personnel shall be knowledgeable of best practices when implementing security controls including software engineering methodologies, security engineering methodologies, security engineering principles, and … TS/SCI with CI Polygraph Requirements/Responsibilities: • Knowledge of and experience with ICD 503 and the Government's certification and accreditation process • Proficient with networks, computer components, system protocols, and COTs technology • Knowledge of system methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers … Linux, Unix, Mac OS • Technical experience in configuring and supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configuration management, system maintenance, integration testing, and informationsystem engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services More ❯
well. I came across your profile on Clearance job and wanted to reach out regarding a unique opportunity. I work for Cedge, and we're looking to hire a System engineer . I think your experience in System engineering is a great fit for this role. Client : NGA Clearance : TS/SCI needed Location : Springfield/Chantilly , VA … Provides expert advice to the government in the areas of relating vision, strategy, plans, needs, requirements and process and capability developments Operates at the level of integrating multiple Major System Acquisitions across organizational, agency, department and governmental/national boundaries Oversees and coordinates the work of Senior and Mid-level contractor Systems Engineers Works closely with both the OSP … or related STEM degree program Expert-level professional technical experience in government or industry in relevant work areas including: DoD/IC Acquisition Process, Requirements Process, PPBES Process or system engineering of large complex System of Systems or Service Oriented Architecture/Cloud Environments systems engineering, systems integration or systems development experience Technical leadership experience with IC mission More ❯
changes. A complete understanding of the systems engineering process from concept phase through systems test. Must be adept at: Architecture Development, Functional Analysis, Requirements Allocation & Traceability, Trade-off Studies, System Synthesis and System Evaluation (Integration & Verification Testing). Knowledge in Public Key Infrastructure (PKI) including Transmission Layer Security (TLS) and certificate/key management. Model-Based Systems Engineering … MBSE) experience Proven experience applying the left side of the V-model, including requirements analysis, system architecture, and design. Hands-on experience with systems integration and verification testing (right side of the V-model). Proficiency in Python scripting for test automation, diagnostics, and system-level debugging in embedded environments. US Citizenship required Active US Government security clearance … DOD SECRET minimum) Willingness to travel up to 10% of time Preferred Additional Skills: Understanding of Key ManagementSystems including Electronic Key ManagementSystem (EKMS) and Key Management Infrastructure (KMI) as they impact the design of End Cryptographic Units (ECUs) Proven track record of success and experience in the architecture, design, analysis, integration More ❯
benefits as provided. Benefits are subject to change with or without notice. Procurement Systems Analyst Responsibilities Include: Run metrics reports and queries to support data quality and data management activities related to various acquisition activities. Develop applications in Power Platform. Collect, analyze, and report data to meet customer needs by loading, extracting and presenting data from multiple data … and assistance awards. Assist with gathering data to respond to data calls and Freedom of Information Act (FOIA) requests. Provide oversight and monitor acquisition informationsystem requests within the ticketing system. Provide system administration assistance in support of Federal, DoD, and Navy eBusiness- related systems such as running reports, activities involved with activation/… deactivation of accounts, administrative support that assist eBusiness with gathering data and auditing of accounts, troubleshooting eBusiness system applications as problems arise or reported in the ticketing system Performs other job-related duties as assigned Procurement Systems Analyst Experience, Education, Skills, Abilities requested: Bachelor's Degree from an accredited college or university. Bachelor's Degree in a Technical More ❯