Location: Annapolis Jct, MD Category: ISSO Travel Required: No Remote Type: No Clearance: TS/SCI w/Polygraph Senior Information System Security Officer (ISSO) Provide support for implementing and enforcing information systems security policies, standards, and methodologies. Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information. … Assist with the Configuration Management for information system security software, hardware, and firmware. Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation. Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades. Evaluate security solutions to ensure they meet security requirements for processing information. Maintain operational … security posture for information systems. Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system/program/enclave. Develop and maintain documentation for Certification & Accreditation in accordance with specified policies. Develop and update system security plans and other IA documentation. Provide support for Information Assurance Vulnerability Alerts More ❯
security as a business enabler and integral to its global services. Competitive salary and benefits, with opportunities for international exposure and professional growth. About the Role: As a Business Information Security Officer (BISO), you will play a pivotal role in shaping and delivering information security strategies that align with business objectives. Leveraging your expertise in professional services … organizational goals while mitigating risks. Manage and lead a team of Governance, Risk, and Compliance (GRC) Analysts, fostering a high-performing and collaborative team environment. Provide strategic advice on information security, ensuring alignment with industry best practices and regulatory standards. Collaborate with global stakeholders to address security challenges with practical, business-driven solutions. Ensure the organization's security frameworks … mindset with the ability to solve complex problems using practical, business-oriented approaches. Exceptional communication and influencing skills to engage with senior stakeholders across diverse regions. Solid understanding of information security principles, frameworks, and regulatory requirements. More ❯
Job Description INFORMATION SYSTEMS SECURITY OFFICER (ISSO) The company is seeking junior, mid-level, and senior Information Systems Security Officers (ISSO) to provide SETA support in Hanover, MD. RESPONSIBILITIES Assist the ISSMs in meeting their duties and responsibilities. Implement and enforce all DoD Information Systems and Platform IT system cybersecurity policies and procedures, as defined by … static code analysis, Pen Testing, and Scanning Results. Review network, data flow, org charts and etc for potential vulnerabilities related to processes or personnel. QUALIFICATIONS Bachelor's Degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science Information Assurance (IA) baseline certification commensurate to position Minimum years of related experience in executing life cycle information … cyber security Junior: 2 years of experience Mid-level: 5 years of experience Senior: 7 years of experience DESIRED QUALIFICATIONS Thorough knowledge of NIST 800 series Special Publications, Federal Information Processing Standards (FIPS) and other relevant federal and DoD cybersecurity regulations. Experience in creating and maintaining security configuration baselines for Windows and Linux platforms, networking equipment, cloud technologies and More ❯
R- Description Senior Information System Security Officer (ISSO) Leidos currently has an opening for a Senior Information System Security Officer (ISSO) to work at our Annapolis Junction, MD location. The selected candidate will act as an ISSO for a large software development program which includes software maintenance and development, IT support (Network/Workstation/Server … systems integration and life cycle support, enterprise application development, network engineering, and information systems security (ISS). The candidate will work with other security professionals in developing and implementing strategies to detect and mitigate threats to information systems, protect critical data sets, and provide assessments of system and network vulnerabilities. Primary Roles and Responsibilities Provide support for implementing … and enforcing information systems security policies, standards, and methodologies. Assist in the evaluation of security solutions to ensure they meet security requirements for processing multiple types of information. Assist with the Configuration Management for information system security software, hardware, and firmware. Analyze threats and develop and implement best practice methodologies for incident detection, reporting, and vulnerability remediation. Maintain More ❯
As a Top Secret cleared Information Systems Security Officer you will be working in an organization that's mission is to develop and operate the best possible software for critical national security enterprise applications. This organization leverages SCRUM and SAFE Agile software development methodology and strong Dev Ops practices. You will be responsible for technical information assurance … and presenting results. This position will be contingent upon award to support on-site in Washington, DC at the customer facility. Responsibilities Serves as the principal advisor to the Information System Owner (SO), Business Process Owner, and the Chief Information Security Officer (CISO)/Information System Security Manager (ISSM) on all matters, technical and otherwise, involving … the security of an information system. ISSOs are responsible for ensuring the implementation and maintenance of security controls. Directs and implements the necessary controls and procedures to cost-effectively protect information systems assets from intentional or inadvertent modification, disclosure, or destruction. Provides guidance and direction for the physical protection of information systems assets to other functional units. More ❯
and empowering a diverse, high-performing workforce that is passionate about what they do, committed to our shared values and dedicated to our customers' mission. Intelink Services provide interagency information sharing, content discovery, and collaboration capabilities on the IC system domains to the IC and its partners in Defense, Homeland Security, Foreign Affairs, and Law Enforcement. AT&T has … an opening for an ISSO I to support Public Sector Solutions. Description of Job Duties/Responsibilities: Provides support for a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies Maintains operational security posture for an information system or program to ensure … information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration More ❯
This is a contingent opportunity The ISSO is responsible for the administration and management of the Information Security program for Headquarters United States Space Force (HQ USSF) Staff Security Office. Duties: Provide Information Systems Security Officer duties for USSF, to include coordination of software and hardware change/problem resolution, account access, data transfers, scanning, and copying … for all assigned SCI and/or SAP facilities; Provide AF Joint Worldwide Intelligence Communications System (JWICS) account and Public Key Infrastructure (PKI) certificate support and troubleshooting assistance; Process information technology (IT) and asset requirements and purchases; Oversee IT disposal and destruction IAW DoD policies and agency procedures; Conduct annual hardware inventories and maintainrecords of IT systems within facilities More ❯
The Information Systems Security Officer (ISSO) III is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many … and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of … agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: Assist the ISSM in meeting their duties and responsibilities. Prepare, review, and update authorization packages. Ensure approved procedures are More ❯
The Information Systems Security Officer (ISSO) III is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many … and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of … agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: Assist the ISSM in meeting their duties and responsibilities. Prepare, review, and update authorization packages. Ensure approved procedures are More ❯
R- Description The Digital Modernization Sector at Leidos currently has an opening for an Information System Security Officer supporting the HEITS Contract as part of the Department of Homeland Security (DHS) Insider Threat Program (ITP). This is an exciting opportunity to use your experience to support security accreditation and sustainment activities. The ITP mission is to identify … business hours. Perform weekly, or as directed by the government, vulnerability scans in support of FISMA requirements. For all systems, coordinate with the respective system owner, system administrator or Information System Security Officer (ISSO) to notify them that weekly scanning is to be performed and that the scan results are to be forwarded to the ITP for analysis. … Support security assessments by working with the respective system owner, system administrator and/or Information System Security Officer (ISSO) to defining the scope, developing a test plan and rules of engagement document, obtaining necessary government approval, analyzing results, preparing a written report with the findings, impacts, and recommendations, and holding out briefings of findings. Provide a quarterly More ❯
devices including desktop, workplace peripherals, and voice and video devices. We support local and campus area networks, including wireless and cable plant. AT&T has an opening for an Information System Security Officer: To support the delivery and management of end-user IT systems. This position requires office presence a minimum of 5 days per week and is … posted. No relocation is offered. Description of Job Duties/Responsibilities: Evaluate security solutions to ensure they meet security requirements for processing classified information. Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program. Develop and maintain documentation for C&A in accordance with ODNI and … DoD policies. Develop and update the system security plan and other IA documentation. Provide configuration management for security-relevant information system software, hardware, and firmware. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system. Develop system security policy and ensure compliance. Administer the user identification and More ❯
activities. -Manage POA&M activities related to ATO Asset where possible in completing POA&M activities. -Ensuring the implementation of DOE and NNSA cybersecurity policies and procedures for designated information systems Conducting the Assessment and Authorization (A&A) activities for designated systems -Documenting the implementation of protection measures within the security plan for the systems -Ensuring the appropriate access … is provisioned for users of designated systems. -Work to establish and maintain Configuration Management of documentation Identifying, assessing, and documenting threats and risks to designated systems. Capturing and maintaining information system security artifacts. -Work to establish and maintain Configuration Management of documentation. -Conducting cybersecurity tests and assessments and providing results of these activities to the ISSM. -Evaluating the security … impact and recommending implementation strategies for security significant changes to the assigned info Identifying cyber security training needs in terms of job responsibilities or roles. -Conducting information system risk assessments. -Responding to and reporting of incidents related to their assigned information systems. -Development of security processes and procedures to support the ISSM's Cyber Security Program. -Creating and More ❯
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day … and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of … agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: Assist the ISSM in meeting their duties and responsibilities Prepare, review, and update authorization packages Ensure approved procedures are More ❯
Sunnyvale, California, United States Hybrid / WFH Options
Lockheed Martin Corporation
cybersecurity principles. Rising to the challenge of building a more secure world for the warfighter, space exploration, climate sustainability and commercial use. This position will perform duties as a Information Systems Security Officer at the Lockheed Martin Space facility in Sunnyvale, CA. The work that ISSOs do can be summarized in this way: - You will have a direct … cyber discipline - You can enjoy a work-life balance that allows for flex hours and a family-first culture. Key Responsibilities of this role includes: - Support day-to-day information system security operations including hardware and software implementations. - Carry out technical administration of IS in accordance with internal LM and customer security requirements, primarily Risk Management Framework (RMF). … and respond to network and security events. - Document compliance actions within the approved automated compliance tracking system or develop a plan of actions and milestones (POA&M) with the Information Systems Security Manager (ISSM) to address non-compliance in the allotted time frame. - Ensure systems are operated, maintained, and disposed of in accordance with internal security policies and practices More ❯
Sunnyvale, California, United States Hybrid / WFH Options
Lockheed Martin Corporation
cybersecurity principles. Rising to the challenge of building a more secure world for the warfighter, space exploration, climate sustainability and commercial use. This position will perform duties as a Information Systems Security Officer at the Lockheed Martin Space facility in Sunnyvale, CA. The work that ISSOs do can be summarized in this way: - You will have a direct … cyber discipline - You can enjoy a work-life balance that allows for flex hours and a family-first culture. Key Responsibilities of this role includes: - Support day-to-day information system security operations including hardware and software implementations. - Carry out technical administration of IS in accordance with internal LM and customer security requirements, primarily Risk Management Framework (RMF). … and respond to network and security events. - Document compliance actions within the approved automated compliance tracking system or develop a plan of actions and milestones (POA&M) with the Information Systems Security Manager (ISSM) to address non-compliance in the allotted time frame. - Ensure systems are operated, maintained, and disposed of in accordance with internal security policies and practices More ❯
taken. Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements. Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to key stake holders. Recognize a possible security violation and take appropriate action to report the incident, as required. Assist the Program Managers and the Information System Security … systems are operated, maintained, and disposed of in accordance with organization security policies and procedures. Conduct network, system, and application vulnerability scanning, configuration assessment, and remediation. Lead and align information technology (IT) security priorities with the security strategy. Prepare for and participate in periodic organization compliance assessments. Interpret patterns of noncompliance to determine their impact on levels of risk More ❯
The Information System Security Officer I provides support for a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are … established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware … implementation; communication protocols; and encryption techniques/tools. Bachelor's degree in Computer Science or related discipline from an accredited college or university is required. DoD 8570 compliance with Information Assurance Technician (IAT) Level I or higher is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor's degree. Required Certification: Any More ❯
Information Governance & Data Protection Officer. Up to £300 p/day - "Inside IR35" via an umbrella company. 3 Months Initial - Hybrid (Edinburgh). 3 Month initial contract opportunity for an Information Governance & Data Protection Officer, with expert knowledge of the Freedom of Information (Scotland) Act. What you'll be doing Working between your home office & their … offices in Edinburgh - The project involves advice, incident response and data protection design. What experience you'll need to apply for this role Information Governance & Data Protection Officer (Mid-Senior). Freedom of Information (Scotland) Act (Advanced-Expert). Hybrid working in Edinburgh (Essential). What you'll get in return for your experience The daily rate More ❯
Dunbar, East Lothian, United Kingdom Hybrid / WFH Options
Digital Preservation Coalition
Vacancy for InformationOfficer at East Lothian Council Vacancy for InformationOfficer at East Lothian Council 28 August 2022 Haddington, East Lothian and Home Working £28,979 - £32,666 per year Full-Time We are looking for a committed and enthusiastic individual to join the Council's Information Governance team, to support the development of … a subject area that requires technical knowledge as well as analytical and communication skills. You will need to engage colleagues around the challenges and opportunities of digital preservation and information management, and work with them to appraise, secure and maintain their digital records. Our citizens depend on us getting this right to ensure services are provided in the best … is not essential, but prior knowledge would be an advantage. We are committed to supporting your development as a digital recordkeeping specialist, while offering you a wide range of information governance activities, projects, and training to get involved in. More ❯
Piper Companies is seeking an experienced ISSO- CI Polywho can work onsite in Raleigh, NC.The ISSO - CI Poly will be responsible for the lifecycle of Information Systems and once authorized, the ISSO- CI Poly will maintain compliance with all applicable CONMON requirements. Responsibilities of the ISSO - CI Poly include: Plan, manage and provide support to ensure the completion of … all applicable CONMON requirements Conduct weekly audits, vulnerability scanning, briefings and reviews of the System Security Plan Requirements for the ISSO- CI Poly include: 3+ years' experience as an Information Systems Security Officer Strong knowledge of the Intelligence Community Directive (ICD) 503 and Risk Management Framework In-depth knowledge of Windows, Linux, Unix and AWS Strong experience implementing More ❯
Job Title Information Systems Security Officer, Senior Overview EverWatch is a government solutions company providing advanced defense, intelligence, and deployed support to our country's most critical missions. We are a full-service government solutions company. Harnessing the most advanced technology and solutions, we strengthen defenses and control environments to preserve continuity and ensure mission success. EverWatch employees … a protected veteran or any other status protected by applicable federal, state, local, or international law. Responsibilities Are you looking for an opportunity to share your experienc e in Information Systems Security Officer roles to support our country ? A s a systems security engineer, you can identify the security system needed to assess vulnerabilities and recommend the best … wledge of security devices and implementation. You 'll use your curiosity for technology and market trends to further research and develop security solutions. Using your knowledge and experience in Information system security software, hardware, and firmware, you'll assess security threats and implement infrastructure controls. In this role, you'll closely impact the Department of Defense (DoD ) by supporting More ❯
Job Number: R Intelligence and Information Disclosure Officer The Opportunity: Critical decisions are made every single day in our government. With all the information available today, it takes a skilled analyst to know how to find and interpret the best data to give their clients the right answers. As an intelligence professional, you will support improved declassification … processes, data collection, and integration within the organization. You'll track records from accessioning to their final availability to the public. As an Intelligence and Information Disclosure Officer on our team, you'll help your client understand the releasability of analytical production. Using your comprehensive understanding of various collection platforms, you'll explore new data sources, build effective … queries, and combine information from disparate sources. As the authority on document review, your client will look to you for time-critical recommendations, often under pressure. You'll share your expertise with other analysts through leadership and mentoring. As an intelligence professional, you'll serve as the focal point and principal liaison for the organization's planning, implementation, and More ❯
Our client is a world leading energy and construction company undergoing rapid growth in the Netherlands. They are looking for a number of Information Security Officers, ideally someone with a technical/engineering background to join their office in North Brabant, Netherlands Please note: Dutch speaking (native/full professional level) is required for this role Job Description Understanding … of information security & compliance Documenting and managing risks related to IT systems You will report directly to the head of IT Perform both consulting, advisory and assessment services. Implementation and audit of diverse range of Information Security policies Be able to travel regularly Ability to build and maintain relationships with clients. Act as a specialist for the companies … Technical/Security Engineering background - as you will be reporting/explaining to security engineers Minimum of 5 years of cyber security experience Strong foundational knowledge and experience in information security. Benefits: Company car allowance Salary: 4.5k - 6.5k per month depending on experience Hybrid - 3 days based in the office Well-being support If you or someone you know More ❯
what you're looking for. Job Description: Parsons is looking for a talented Junior ISSO to join our growing team! What You'll Be Doing: Develops, maintains, and implements information security standards, procedures, and guidelines for applications and databases. Ensures that systems and organizational databases are protected from unauthorized access and use. Monitors systems, identifies threats, and handles disaster … 1+ years of experience OR HS/GED with 4+ years of experience. What Desired Skills You Might Bring: Familiarity with conducting research and analysis. Familiarity with network and information system security principles and best practices. Familiarity with controlling, labeling, virus scanning, and appropriately transferring data (uploading/downloading) between information systems at varying classification levels. Ability to … work with the military, civilians, and other contractors at all levels. Ability to prioritize tasks. Familiarity with applicable IC and DoD policies, procedures and operating instructions related to Information Technology, Information Assurance, Information Management (IT/IA/IM). Security Clearance Requirement: An active Top Secret SCI w/Polygraph security clearance is required for this More ❯
MB Energy, founded in 1947 and head quartered in Hamburg, is an inde pendent and integrated energy company with operations in Europe, the United States, and Singapore. The company is active in the import, storage, distri bution, and marketing of More ❯