The Information System Security Officer I supports a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and … followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. … to include at least one (1) of the following areas: knowledge of current security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools. Compliance with Information Assurance Technician (IAT) Level I or higher is required. Any of the following or higher certification; A+ with Continuing Education, Cisco Certified Network Associate-Security (CCNA-Security), Network+ Continuing More ❯
Please review the job details below. Maxar is seeking an Information System Security Officer (ISSO) to join our team in Reston, VA. Life with Us: Project:We're supporting a well-established customer that works on a critical and high-visibility mission. The team is tremendously talented and we need to add a seasoned ISSO with a strong … or Tech Leads to implement technical solutions during development. Coordinate and lead office ATO processes acting as primary point of contact for customer and stakeholder engagements. Prepare and maintain information systems Accreditation and Authorization (A&A) packages (BoE - ConOps/Customer Test Plan, SSPs SCTM). Minimum Requirements: Must be a US citizen and have an active TS/… have a different range. We offer a comprehensive package of benefits including paid time off, health and welfare insurance, and 401(k) to eligible employees. You can find more information on our benefits at: The application window is three days from the date the job is posted and will remain posted until a qualified candidate has been identified for More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Lockheed Martin
Job Number 692890BR Description:TS/SCI security clearance with ability to obtain Polygraph. This position will perform duties as a Classified Cybersecurity Information Systems Security Officer (ISSO) for systems located within close proximity of the LM Space facility in Colorado Springs with a 60% Local Travel Requirement. The work that Cybersecurity ISSO's do can be summarized … cyber discipline - You can enjoy a work-life balance that allows for flex hours and a family-first culture. Key Responsibilities of this role includes: - Oversee day-to-day information system security operations including hardware and software implementations. - Carry out technical administration of IS in accordance with internal LM and customer security requirements, primarily Risk Management Framework (RMF). … and respond to network and security events. - Document compliance actions within the approved automated compliance tracking system or develop a plan of actions and milestones (POA&M) with the Information Systems Security Manager (ISSM) to address non-compliance in the allotted time frame. - Ensure systems are operated, maintained, and disposed of in accordance with internal security policies and practices More ❯
professional with 4-6 years of experience and TS/SCI Clearance to be our next ISSO, Staff at Schriever Space Force Base, CO Responsibilities Provide technical and programmatic Information Assurance Services to internal and external customers in support of network and information security systems. Design, develop and implement security requirements within an organization's business processes. Prepare … documentation from information obtained from customer using accepted guidelines such as DITSCAP (DoD Information Technology Security Certification and Accreditation Process). Prepare Security Test and Evaluation plans. Provide certification and accreditation support in the development of security and contingency plans and conducts complex risk and vulnerability assessments. Analyze policies and procedures against Federal laws and regulations and provides … various aspects of system administration. Conducs security program audits and develop solutions to lessen identified risks. Develop strategies to comply with privacy, risk management, and e-authentication requirements. Provide information assurance support for the development and implementation of security architectures to meet new and evolving security requirements. Evaluate, develop and enhance security requirements, policy and tools. Aid in computer More ❯
of todays mission and stay ahead of tomorrows threat. Our team solves tough, meaningful problems that create a safer, more secure world. Our cybersecurity team is seeking a Senior Information Systems Security Officer (ISSO) to support our team 100% onsite at our facility in El Segundo, California. The successful candidate will interface with the Information Systems Security … Publications, customer directives, and company policies as applicable all NISPOM Chapter 8, DAAPM, JSIGpolicies. What You Will Do Assessing and monitoring system compliance, auditing, security plan development and delivering information systems security education and awareness. Investigating information system security violations and help prepare reports specifying corrective and preventative actions. Reviewing and approving (within authority) configuration management requests. Conducting … in a related field and minimum 3 years experience. Current IAM Level I certification(Security+ or other). Relevant Experience Considered in any combination: Cybersecurity, systems security or hardening Information Technology Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), Joint SAP Implementation Guide (JSIG), National Industrial Security Program Operating Manual (NISPOM More ❯
s mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world. Our cybersecurity team is seeking a Senior Information Systems Security Officer (ISSO) to support our team 100% onsite at our facility in El Segundo, California. The successful candidate will interface with the Information Systems Security … customer directives, and company policies as applicable all NISPOM Chapter 8, DAAPM, JSIG policies. What You Will Do Assessing and monitoring system compliance, auditing, security plan development and delivering information systems security education and awareness. Investigating information system security violations and help prepare reports specifying corrective and preventative actions. Reviewing and approving (within authority) configuration management requests. Conducting … in a related field and minimum 3 years' experience. Current IAM Level I certification (Security+ or other). Relevant Experience Considered in any combination: Cybersecurity, systems security or hardening Information Technology Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), Joint SAP Implementation Guide (JSIG), National Industrial Security Program Operating Manual (NISPOM More ❯
weather capability, tracking objects in geosynchronous orbit - a testament to Northrop Grumman's commitment to enhancing security and safety in deep space on a global scale. Your Role The Information Systems Security Officer (ISSO) is responsible for the day-to-day onsite execution of the Systems Security Engineering activities required for the ongoing maintenance and uplift of the … the ability to work autonomously or as part of a larger group, and a demonstrated ability to always liaise professionally with both internal and external stakeholders. Current experience in information security is essential , ideally in a Defence environment Qualifications or training in Systems Security Engineering or cybersecurity related field (CISSP or similar) are essential, as is experience with Red More ❯
and explore new technologies. Join a tremendous technical team solving hard problems with true mission relevance on emerging technologies. Provides support for a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program … to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. … Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with NSA/ More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Agile Defense, Inc
pass CI Poly to obtain SCI Location: Washington, DC (5 days/week onsite only; no remote work) Responsibilities/Duties: Ensure that appropriate steps are taken to implement information security requirements for IT systems throughout their life cycle, from the requirements definition phase through disposal. Perform compliance monitoring, analysis, tracking and reporting Apply NIST Risk Management Framework and … designing, or analyzing security controls relevant to networked systems Perform scans, analyze code, and conduct vulnerability scans and assessments. Develop and present, both verbally and in writing, highly technical information and presentations to non-technical audiences at all levels of the organization. Required Qualifications: 3-6 years of strong information security experience (personnel security experience does not qualify … experience and a Master's degree Must be able to demonstrate integration of regulations and processes such as NIST 800 series special publications, Risk Management Framework (RMF), and Federal Information Security Act (FISMA) reporting for national security systems (NSS) Must have exceptional writing capabilities on technical and process security controls Must be able to articulate risk mitigation and answer More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Lockheed Martin
group. The position is located in Colorado Springs, CO and will support the C2BMC program. The candidate will lead a team to ensure security compliance through the implementation of information system security best practices for assigned information systems utilizing industry-standard cybersecurity tools. The candidate will be responsible for the overall ATO lifecycle and compliance enforcement of cybersecurity … requirements. The candidate will be expected to participate in tasks that include, but are not limited to the management of information systems, providing information for the development of System Security Plans, establishing and maintaining hardware and software configuration management plans, preparing documents to gain government approvals to operate information systems, weekly system audits, anti-virus software management … user accounts, preparing for and supporting inspections, participating in enterprise initiatives, continuous monitoring, self-inspection review, Proposal Estimates, and other duties as assigned. Successful candidates should be knowledgeable of information technology security principles, various computer/network operating systems, and Microsoft suite of applications. This is a multi-tasking environment that demands customer service, communication, leadership, and organizational skills. More ❯
January 2024 Edinburgh, Scotland Full-Time Role Description Information Governance is a professional service team within the Governance and Legal Services Directorate. Working collaboratively with colleagues within the Directorate and across the University, we support the University's mission and contribute to its strategic priorities. We promote effective information governance to support University business worldwide and manage information … relevant legal, regulatory, and audit requirements. Joining the University during an exciting period of digital transformation, the role holder will work collaboratively and supportively with other members of the Information Governance team. The role involves providing timely, expert advice and guidance to the University community on lifecycle information governance, playing a key role in delivering the Information and Records Management Programme, and helping to embed data protection by design within strategic and operational activities. Detailed Description The role holder will provide specialist advice on information and records management and data protection to enable the University to optimise the use of information and manage information risks throughout its lifecycle. Reporting to the Head of More ❯
Information System Security Officer (ISSO), Level 1 Top Secret SCI w/Polygraph Required An Information System Security Officer (ISSO) includes skill requirements from a security or Office Security Program Office and Office of Security and Counterintelligence (OS&CI) and Facilities and Information Systems Division (F&ISD) for all information technology issues such as … malicious code eradication, configuration management, assessment and authorization of current and future systems. ISSOs shall know how to implement common information system security practices, policies, and technologies. Additionally, ISSOs demonstrate self-motivation, initiative, sound judgement, effective interpersonal skills, team building skills, and effective communication skills. The Level 1 ISSO position is an entry level IS professional who provides assistance … to the Government on basic IT and information system security issues affecting the mission. Please see table for education and years of experience requirements. ISSO Level 1 Contractors should possess the following desired qualifications: a. Familiarity with conducting research and analysis; b. Familiarity with network and information system security principles and best practices; c. Familiarity with controlling, labeling More ❯
Information Systems Security Officer 3 Provides support for a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established … and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and … and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF). The Level 3 Information Systems Security Officer (ISSO) shall possess the following capabilities: • Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies. • Assist with More ❯
Top Secret SCI w/Polygraph Required Information System Security Officer (ISSO), Level 3 The Level 3 ISSO position is a senior level or subject matter expert (SME) information system security professional who provides advice and assistance to the Government regarding secure configuration and operation of IT assets. Level 3 ISSOs apply extensive knowledge and experience of … a variety of information system security concepts, practices, and procedures. ISSO Level 3 contractors should possess all ISSO Level 1 and Level 2 qualifications, plus the following desired qualifications: Expertise with configuration management; system maintenance; and integration testing; Ability to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data; Expert in the use of … malicious code; Expert in detecting and preventing computer security compromises in a networked environment; Expertise in forensics chain of custody and evidentiary preservation; Demonstrated proficiency in successfully guiding complex information systems through assessment and authorization control gates; Analytical abilities to decipher complex technical configuration management documents; Proficient in maintaining databases; Thorough working knowledge of all applicable IC, DoD policies More ❯
Top Secret SCI w/Polygraph Required Information System Security Officer (ISSO), Level 3 The Level 3 ISSO position is a senior level or subject matter expert (SME) information system security professional who provides advice and assistance to the Government regarding secure configuration and operation of IT assets. Level 3 ISSOs apply extensive knowledge and experience of … a variety of information system security concepts, practices, and procedures. ISSO Level 3 contractors should possess all ISSO Level 1 and Level 2 qualifications, plus the following desired qualifications: Expertise with configuration management; system maintenance; and integration testing; Ability to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data; Expert in the use of … malicious code; Expert in detecting and preventing computer security compromises in a networked environment; Expertise in forensics chain of custody and evidentiary preservation; Demonstrated proficiency in successfully guiding complex information systems through assessment and authorization control gates; Analytical abilities to decipher complex technical configuration management documents; Proficient in maintaining databases; Thorough working knowledge of all applicable IC, DoD policies More ❯
Transform technology into opportunity as an Information System Security Officer (ISSO) with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate. At GDIT, people are our differentiator. As an Information System … Security Officer, you will help ensure today is safe and tomorrow is smarter. HOW AN INFORMATION SYSTEM SECURITY OFFICER WILL MAKE AN IMPACT Serve as a principal advisor on all matters, technical and otherwise, involving the security of Information Technology Division information systems. Implement Risk Management Framework (RMF) in accordance with NIST SP … RMF process. Ensure all network, system, application, or service users have the requisite security clearances, authorization, need-to-know, and security responsibility awareness prior to granting access to ITD information systems. Research and remediate security vulnerability findings for applicable systems within the ITD as documented in the Security Assessment Report (SAR) and its Plan of Actions and Milestones (POA More ❯
As a Top Secret cleared Information Systems Security Officer you will be working in an organization that's mission is to develop and operate the best possible software for critical national security enterprise applications. This organization leverages SCRUM and SAFE Agile software development methodology and strong Dev Ops practices. You will be responsible for technical information assurance …/3 standards and policy control grouping. You will need experience determining products to meet client needs and presenting results. Responsibilities: Serves as the principal advisor to the Information System Owner (SO), Business Process Owner, and the Chief Information Security Officer (CISO)/Information System Security Manager (ISSM) on all matters, technical and otherwise, involving the … security of an information system. ISSOs are responsible for ensuring the implementation and maintenance of security controls. Directs and implements the necessary controls and procedures to cost-effectively protect information systems assets from intentional or inadvertent modification, disclosure, or destruction. Provides guidance and direction for the physical protection of information systems assets to other functional units. Provides More ❯
About the job Information Systems Security Officer Top Secret Clearance Jobs is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours. Currently, ManTech is actively seeking a motivated, customer-oriented Information Systems Security Officer II (ISSO II) to join our team in the El … ISSO's primary function is working within Special Access Programs (SAPs) supporting SMC and AFSPC mission areas. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Responsibilities: Review, prepare, and update AIS accreditation packages. Notify customer when changes occur that might affect AIS accreditation/certification. Perform AIS … Minimum 1 year of SAP-related experience highly desired. Minimum 2 years of relevant SCI experience Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire. Must complete training on Joint Security Implementation Guidance (JSIG) and Risk Management Framework (RMF) Information Security More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Wood Consulting Services, Inc
Overview Information Systems Security Officer, Senior Location: Annapolis Junction, Maryland, USA Job Type: Full-Time Shift: Days Telework: None Salary Range: $180,000 tp $200,000 Starting salary is based on minimum education and years of experience and increases based on education and/or experience. Overview: Join a mission-critical program supporting national security as an Information Systems Security Officer (ISSO). We are seeking a highly experienced and motivated security professional to support a large-scale software development and IT operations program. This role encompasses software maintenance and development, IT support, systems integration, enterprise application development, and comprehensive information systems security. As an ISSO, you will collaborate with a team of elite cybersecurity … experience. Security Clearance Requirements: This position requires all candidates to be U.S. Citizens and possess an active TS/SCI Security Clearance with a Polygraph. Responsibilities Enforce and implement information systems security policies, standards, and methodologies. Evaluate and recommend security solutions to meet multi-domain information processing requirements. Support configuration management (CM) for security-relevant software, hardware, and More ❯
U) Provides support for a program, organization, system, or enclaves information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of … security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses … National Institute of Standards and Technology Risk Management Framework (NIST RMF). Salary Range: $115,000-$155,000 REQUIREMENTS : (U) Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies (U) Assist with preparation and maintenance of documentation (U) Assist in the evaluation of security solutions to ensure they meet security requirements for More ❯
AMERICAN SYSTEMS is an employee-owned federal government contractor supporting national priority programs through our strategic solutions in the areas of Information Technology, Test & Evaluation, Program Mission Support, Engineering & Analysis, and Training. Responsibilities As a Senior Information Systems Security Officer with AMERICAN SYSTEMS you will have the opportunity to do the following: Ensure the appropriate operational security … posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Develop physical or logical topologies for a system, assist the ISSM in meeting their duties and responsibilities Assist the ISSM in meeting their duties and … responsibilities Prepare, review, and update authorization packages Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior More ❯
Mantis Security is a leading specialty firm of high caliber talent who specialize in Cyber Operations, Cyber Defense, Information Assurance, Software Development, DevSecOps, Security Engineering, and Cloud Engineering. We enable and protect our nation's most important IT assets and invest in the long-term career development of every employee! We are currently looking for the next ISSO to … join our team of experts! What you will be doing: Mantis Security is seeking for immediate placement a highly qualified and technical Information Systems Security Officer (ISSO) to lead the Assessment and Authorization (A&A) for multiple analytic mission systems. The ISSO must be proficient in standard A&A activities, and will generate and maintain the complete security … Support to the Assessment and Authorization (A&A) and all Risk Management Framework (RMF) processes (ICD 503, CNSSI-1253, NIST 800-37, NIST 800-53, etc.) for all multiple information systems Work with software engineers, DevOps engineers, release managers, and project management to follow A&A and ATO processes, and ensure Minimum Viable Product (MVP) and full releases are More ❯
is essential in shaping how colleagues across the organisation think and act securely in their day-to-day work. Key Responsibilities Lead the design and execution of the global Information Security Governance, Training & Culture strategy. Develop engaging, inclusive training and awareness initiatives, meeting regulatory and business requirements. Implement innovative tools and techniques to enhance behavioural change and cultural engagement. More ❯
be the differentiator in what can be accomplished. Position Details: As an ISSO you will be responsible for ensuring that the appropriate operational security posture is maintained for an information system. You'll support continuous monitoring of networks to detect and correct areas of security non-compliance, unmitigated vulnerabilities, and other risks. You will also need to follow consistent … security processes and play a role in the information systems continuous monitory program. What you will be doing? Perform regular audits of information systems. Assist the information systems security manager in preparing the information system for periodic reaccreditation. Create SOPs, and documents pertaining to cyber security of equipment and networks. Provide support for implementing and enforcing … information systems security policies, standards, and methodologies. Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information. Assist with the CM for information system security software, hardware, and firmware. Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades. Evaluate security solutions to ensure they More ❯
our customers. Our corporate values are transparent; being open and honest with each other. Come and join our dynamic team! JOB DESCRIPTION Seeking a highly motivated and driven Sr. Information Systems Security Officer (ISSO) to work Onsite supporting enterprise IT for our War-fighter customer who upholds America's status as the "Land of the Free" every day … at work, or at play. RESPONSIBILITIES Support program and project management support as well as, serve as Information System Security Officer (ISSO) for a designated NAVAIR program. Manage day-to-day cybersecurity activities, including the oversight of less senior staff and their assigned responsibilities. Perform duties of the Risk Management Framework (RMF) ISSO role, including: Develop platform RMF … Administrators, Network Admins, Lab Managers, Program Managers, and ISSMs). Perform system security assessments. Evaluate and report software IAW DITPR/DADMS requirements. REQUIREMENTS 10 years of experience in Information Systems Security and Program/Project Management. Experience with program/project management and customer interfacing at onboarding. Experience applying analytic techniques in the evaluation of program/project More ❯