This is a contingent opportunity The ISSO is responsible for the administration and management of the InformationSecurity program for Headquarters United States Space Force (HQ USSF) Staff Security Office. Duties: Provide Information Systems SecurityOfficer duties for USSF, to include coordination of software and hardware change/problem resolution, account access, data transfers … scanning, and copying data to/from external media; Attend required technical and security training (e.g. Operating system, networking, security management) relative to assigned duties; Maintain compliance for designated HQSF locations throughout HQSF Area of Responsibility (AOR) IAW AF, DoD and IC guidance; Conduct annual Cyber Assurance self-assessments and program reviews for all assigned SCI and/… or SAP facilities; Provide AF Joint Worldwide Intelligence Communications System (JWICS) account and Public Key Infrastructure (PKI) certificate support and troubleshooting assistance; Process information technology (IT) and asset requirements and purchases; Oversee IT disposal and destruction IAW DoD policies and agency procedures; Conduct annual hardware inventories and maintainrecords of IT systems within facilities overseen by DSZ; Oversee the identifying More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Leyden Solutions Inc
Title: Information Systems SecurityOfficer (ISSO) Clearance: Active TS with ability to pass CI Poly to obtain SCI Location: Washington, DC (5 days/week onsite only; no remote work) Leyden Solutions is an award-winning national security company with an immediate need for an Information System SecurityOfficer (ISSO) to support a … federal law enforcement agency's migration from distributed systems to a data-centric audit and protection approach (DCAP) informationsecurity strategy. Responsibilities/Duties: • Ensure that appropriate steps are taken to implement informationsecurity requirements for IT systems throughout their life cycle, from the requirements definition phase through disposal. • Perform compliance monitoring, analysis, tracking and reporting … Apply NIST Risk Management Framework and NIST SP 800-53 security controls • Analyze and re-mediate weaknesses while working with system administrators and other personnel in the organization to implement risk mitigation • Configuring, designing, or analyzing security controls relevant to networked systems • Perform scans, analyze code, and conduct vulnerability scans and assessments. • Develop and present, both verbally and More ❯
As a Top Secret cleared Information Systems SecurityOfficer you will be working in an organization that's mission is to develop and operate the best possible software for critical national security enterprise applications. This organization leverages SCRUM and SAFE Agile software development methodology and strong Dev Ops practices. You will be responsible for technical information … server scanning, patching, mitigation, and compliance cross-checking of target network assets. Experience in ST&E process and POAM generation. You will need a strong understanding of approved COTS security analyst tools and government mitigation/compliance checkers. You will need a strong comprehension of FISMA, DIACAP, NIST-800 SPs and DCID 6/3 standards and policy control … grouping. You will need experience determining products to meet client needs and presenting results. Responsibilities: Serves as the principal advisor to the Information System Owner (SO), Business Process Owner, and the Chief InformationSecurityOfficer (CISO)/Information System Security Manager (ISSM) on all matters, technical and otherwise, involving the security of an More ❯
The Information Systems SecurityOfficer (ISSO) III is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system … and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment … of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense More ❯
The Information Systems SecurityOfficer (ISSO) III is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system … and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment … of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense More ❯
and empowering a diverse, high-performing workforce that is passionate about what they do, committed to our shared values and dedicated to our customers' mission. Intelink Services provide interagency information sharing, content discovery, and collaboration capabilities on the IC system domains to the IC and its partners in Defense, Homeland Security, Foreign Affairs, and Law Enforcement. AT&T … has an opening for an ISSO I to support Public Sector Solutions. Description of Job Duties/Responsibilities: Provides support for a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies Maintains operational security posture for an information system or … program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment More ❯
R- Description The Digital Modernization Sector at Leidos currently has an opening for an Information System SecurityOfficer supporting the HEITS Contract as part of the Department of Homeland Security (DHS) Insider Threat Program (ITP). This is an exciting opportunity to use your experience to support security accreditation and sustainment activities. The ITP mission … turn help address and eliminate potential threat actors from compromising the DHS mission in safeguarding the homeland. The selected candidate will be responsible for the following: Provide support for security engineering, and the integration and deployment of security technology to support advanced external threat, insider threat, and cyber operations. The contractor shall resolve concerns or issues related to … business hours. Perform weekly, or as directed by the government, vulnerability scans in support of FISMA requirements. For all systems, coordinate with the respective system owner, system administrator or Information System SecurityOfficer (ISSO) to notify them that weekly scanning is to be performed and that the scan results are to be forwarded to the ITP for More ❯
Mantis Security is a leading specialty firm of high caliber talent who specialize in Cyber Operations, Cyber Defense, Information Assurance, Software Development, DevSecOps, Security Engineering, and Cloud Engineering. We enable and protect our nation's most important IT assets and invest in the long-term career development of every employee! We are currently looking for the next … ISSO to join our team of experts! What you will be doing: Mantis Security is seeking for immediate placement a highly qualified and technical Information Systems SecurityOfficer (ISSO) to lead the Assessment and Authorization (A&A) for multiple analytic mission systems. The ISSO must be proficient in standard A&A activities, and will generate and … maintain the complete security body of evidence (BoE) while leading the A&A activities according to the Risk Management Framework (RMF). The ISSO will work with the software engineers and cloud engineers to ensure applications and systems are developed to meet required security controls, as well as to promote proper security configuration. The candidate should possess More ❯
for the full spectrum of operations. The services required by this contract will assist in providing the NRO with a secure mission environment. The contractor shall provide realistic, innovative informationsecurity solutions to accomplish the requirements in addition to program management. The services obtained under this contract shall provide expertise to support information systems security, security control assessments, information assurance engineering, and security control assessments test engineering. AT&T has an opening for an Information System SecurityOfficer (ISSO) Mid-Level to support Federal Solutions . Job Duties/Responsibilities Inclusive, but not limited to: The Mid-Level ISOO position is an information systems professional who provides assistance to … the Government on IT and information systems security issues affecting the mission. Duties may entail the following: Management of data transfers from one system to another. Research of cybersecurity issues/matters. Detect computer security compromises. Managing various number of Systems and ensuring they make it to final ATO status. Support higher level ISSO's with daily More ❯
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for … the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating … the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position More ❯
Sunnyvale, California, United States Hybrid / WFH Options
Lockheed Martin Corporation
cybersecurity principles. Rising to the challenge of building a more secure world for the warfighter, space exploration, climate sustainability and commercial use. This position will perform duties as a Information Systems SecurityOfficer at the Lockheed Martin Space facility in Sunnyvale, CA. The work that ISSOs do can be summarized in this way: - You will have a … direct impact to national security, ultimately contributing to protecting your loved ones - this is dynamic, gratifying and impactful work! - You will have the opportunity to engage in all aspects of the cyber discipline - You can enjoy a work-life balance that allows for flex hours and a family-first culture. Key Responsibilities of this role includes: - Support day-to … day information system security operations including hardware and software implementations. - Carry out technical administration of IS in accordance with internal LM and customer security requirements, primarily Risk Management Framework (RMF). - Upkeep, monitor, analyze, and respond to network and security events. - Document compliance actions within the approved automated compliance tracking system or develop a plan of More ❯
Please review the job details below. Maxar is seeking an Information System SecurityOfficer (ISSO) to join our team in Reston, VA. Life with Us: Project:We're supporting a well-established customer that works on a critical and high-visibility mission. The team is tremendously talented and we need to add a seasoned ISSO with a … or Tech Leads to implement technical solutions during development. Coordinate and lead office ATO processes acting as primary point of contact for customer and stakeholder engagements. Prepare and maintain information systems Accreditation and Authorization (A&A) packages (BoE - ConOps/Customer Test Plan, SSPs SCTM). Minimum Requirements: Must be a US citizen and have an active TS/… activities (e.g. Xacta 360, Risk Vision, RSA Archer). Experience with Linux (Red Hat). Working knowledge of the Risk Management Framework (RMF) and associative standards and guidelines. Comptia Security +. DoD 8570 certification. Desired Requirements: Experience working within various system networks and classification levels. Advanced degree in a technical discipline. Experience working on-site at a government customer More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Agile Defense, Inc
pass CI Poly to obtain SCI Location: Washington, DC (5 days/week onsite only; no remote work) Responsibilities/Duties: Ensure that appropriate steps are taken to implement informationsecurity requirements for IT systems throughout their life cycle, from the requirements definition phase through disposal. Perform compliance monitoring, analysis, tracking and reporting Apply NIST Risk Management Framework … and NIST SP 800-53 security controls Analyze and re-mediate weaknesses while working with system administrators and other personnel in the organization to implement risk mitigation Configuring, designing, or analyzing security controls relevant to networked systems Perform scans, analyze code, and conduct vulnerability scans and assessments. Develop and present, both verbally and in writing, highly technical information and presentations to non-technical audiences at all levels of the organization. Required Qualifications: 3-6 years of strong informationsecurity experience (personnel security experience does not qualify; must be INFOSEC related) Minimum of 12 years of IT experience, or 10 years of experience and a Master's degree Must be able to demonstrate integration of More ❯
and life better for people. Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations. Join Accenture Federal Services, a technology company and part of global Accenture, to do work that matters in a collaborative and caring … thrive through hands-on experience, certifications, industry training and more. Join us to drive positive, lasting change that moves missions and the government forward! The work: Create and own Security Artifacts such as System Security Plans and Security Assessment Reports Provide guidance and support to development of Plan of Action and Milestone (POA&M) Create and develop … ATO Packages for technology offerings Propose and ensure systems are complaint within the proper Security policies (NIST 800, FedRAMP, FISMA, RMF etc.) Review and Interpret Network and Application Vulnerability and compliance scans Lead ongoing quality control analysis to Network and Application Vulnerability processes Lead Network and Application Vulnerability review meetings with senior leadership Here's what you need More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Lockheed Martin
opportunity within the RMS classified cybersecurity group. The position is located in Colorado Springs, CO and will support the C2BMC program. The candidate will lead a team to ensure security compliance through the implementation of information system security best practices for assigned information systems utilizing industry-standard cybersecurity tools. The candidate will be responsible for the … overall ATO lifecycle and compliance enforcement of cybersecurity requirements. The candidate will be expected to participate in tasks that include, but are not limited to the management of information systems, providing information for the development of System Security Plans, establishing and maintaining hardware and software configuration management plans, preparing documents to gain government approvals to operate information … user accounts, preparing for and supporting inspections, participating in enterprise initiatives, continuous monitoring, self-inspection review, Proposal Estimates, and other duties as assigned. Successful candidates should be knowledgeable of information technology security principles, various computer/network operating systems, and Microsoft suite of applications. This is a multi-tasking environment that demands customer service, communication, leadership, and organizational More ❯
Top Secret SCI w/Polygraph Required Information System SecurityOfficer (ISSO), Level 3 The Level 3 ISSO position is a senior level or subject matter expert (SME) information system security professional who provides advice and assistance to the Government regarding secure configuration and operation of IT assets. Level 3 ISSOs apply extensive knowledge and … experience of a variety of information system security concepts, practices, and procedures. ISSO Level 3 contractors should possess all ISSO Level 1 and Level 2 qualifications, plus the following desired qualifications: Expertise with configuration management; system maintenance; and integration testing; Ability to troubleshoot technical configurations and make recommendations on the protection of classified and sensitive data; Expert in … the use of tools used to prevent and or negate malicious code; Expert in detecting and preventing computer security compromises in a networked environment; Expertise in forensics chain of custody and evidentiary preservation; Demonstrated proficiency in successfully guiding complex information systems through assessment and authorization control gates; Analytical abilities to decipher complex technical configuration management documents; Proficient in More ❯
About the job Information Systems SecurityOfficer Top Secret Clearance Jobs is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours. Currently, ManTech is actively seeking a motivated, customer-oriented Information Systems SecurityOfficer II (ISSO II) to join our team … ISSO's primary function is working within Special Access Programs (SAPs) supporting SMC and AFSPC mission areas. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Responsibilities: Review, prepare, and update AIS accreditation packages. Notify customer when changes occur that might affect AIS accreditation/certification. Perform AIS … self-inspections, provide security coordination and review of all system test plans. Identify AIS vulnerabilities and implement countermeasures. Represent the customer on various technical review and inspection teams. Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system accreditation packages. Coordinate, prepare, and track AIS inspections, reports, and responses Maintain AIS securityMore ❯
Sunnyvale, California, United States Hybrid / WFH Options
Lockheed Martin Corporation
cybersecurity principles. Rising to the challenge of building a more secure world for the warfighter, space exploration, climate sustainability and commercial use. This position will perform duties as a Information Systems SecurityOfficer at the Lockheed Martin Space facility in Sunnyvale, CA. The work that ISSOs do can be summarized in this way: - You will have a … direct impact to national security, ultimately contributing to protecting your loved ones - this is dynamic, gratifying and impactful work! - You will have the opportunity to engage in all aspects of the cyber discipline - You can enjoy a work-life balance that allows for flex hours and a family-first culture. Key Responsibilities of this role includes: - Support day-to … day information system security operations including hardware and software implementations. - Carry out technical administration of IS in accordance with internal LM and customer security requirements, primarily Risk Management Framework (RMF). - Upkeep, monitor, analyze, and respond to network and security events. - Document compliance actions within the approved automated compliance tracking system or develop a plan of More ❯
of similar scope, type, and complexity. DoD 8570 compliance with IAM Level II or IAT Level III (i.e., CASP, CISSP, or Associate) Bachelor of Science degree in Computer Science, Information Assurance, InformationSecurity, or related discipline and 12 or more years of related experience. More ❯
Transform technology into opportunity as an Information System SecurityOfficer (ISSO) with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and play a meaningful part in improving how agencies operate. At GDIT, people are our differentiator. As an Information System SecurityOfficer, you will help ensure today is safe and tomorrow is smarter. HOW AN INFORMATION SYSTEM SECURITYOFFICER WILL MAKE AN IMPACT Serve as a principal advisor on all matters, technical and otherwise, involving the security of Information Technology Division information systems. Implement Risk Management Framework (RMF) in accordance … with NIST SP 800-37. Ensure the network, system, application, or service is operated, maintained, and disposed of in accordance with DIA security policies and procedures outlined in the security authorization package. Provide leadership briefs, reports, and supporting documentation regarding the status of applicable systems and their progression through the client's RMF process. Ensure all network More ❯
Job Description INFORMATION SYSTEMS SECURITYOFFICER (ISSO) The company is seeking junior, mid-level, and senior Information Systems Security Officers (ISSO) to provide SETA support in Hanover, MD. RESPONSIBILITIES Assist the ISSMs in meeting their duties and responsibilities. Implement and enforce all DoD Information Systems and Platform IT system cybersecurity policies and procedures, as … defined by cybersecurity-related documentation. Ensure that all users have the requisite security clearances and access authorization, and are aware of their cybersecurity responsibilities for DoD IS and PIT systems under their purview before being granted access to those systems. In coordination with the ISSM, initiate protective or corrective measures when a cybersecurity incident or vulnerability is discovered and … static code analysis, Pen Testing, and Scanning Results. Review network, data flow, org charts and etc for potential vulnerabilities related to processes or personnel. QUALIFICATIONS Bachelor's Degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science Information Assurance (IA) baseline certification commensurate to position Minimum years of related experience in executing life cycle informationMore ❯
As a Top Secret cleared Information Systems SecurityOfficer you will be working in an organization that's mission is to develop and operate the best possible software for critical national security enterprise applications. This organization leverages SCRUM and SAFE Agile software development methodology and strong Dev Ops practices. You will be responsible for technical information … server scanning, patching, mitigation, and compliance cross-checking of target network assets. Experience in ST&E process and POAM generation. You will need a strong understanding of approved COTS security analyst tools and government mitigation/compliance checkers. You will need a strong comprehension of FISMA, DIACAP, NIST-800 SPs and DCID 6/3 standards and policy control … and presenting results. This position will be contingent upon award to support on-site in Washington, DC at the customer facility. Responsibilities Serves as the principal advisor to the Information System Owner (SO), Business Process Owner, and the Chief InformationSecurityOfficer (CISO)/Information System Security Manager (ISSM) on all matters, technical and More ❯
Job Title Information Systems SecurityOfficer, Senior Overview EverWatch is a government solutions company providing advanced defense, intelligence, and deployed support to our country's most critical missions. We are a full-service government solutions company. Harnessing the most advanced technology and solutions, we strengthen defenses and control environments to preserve continuity and ensure mission success. EverWatch … a protected veteran or any other status protected by applicable federal, state, local, or international law. Responsibilities Are you looking for an opportunity to share your experienc e in Information Systems SecurityOfficer roles to support our country ? A s a systems security engineer, you can identify the security system needed to assess vulnerabilities and … recommend the best solution and security strategy. We need your experience to lead the development and implementation of security solutions that will protect infrastructure. On our team, you'll troubleshoot and analyze complex challenges for customers using your kno wledge of security devices and implementation. You 'll use your curiosity for technology and market trends to further More ❯
The team is in need of an additional ISSO candidate to continue work within the Cyber Security Team. This role is supporting Air Force Programs and MIT LL prefers candidates with mid-level experience: Assist and Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs). Continuously validate the organization against … laws to ensure compliance. Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc. Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals. Track audit findings and recommendations to ensure that appropriate mitigation actions … taken. Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements. Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to key stake holders. Recognize a possible security violation and take appropriate action to report the incident, as required. Assist the Program Managers and the Information System More ❯
diverse, high-performing workforce that is passionate about what they do, committed to our shared values, and dedicated to our customers' mission. AT&T has an opening for an Information System SecurityOfficer (ISSO) for the TAC2O systems in providing managed IT support of SAP-IT systems for high-priority defense intelligence collection needs and develop and … s onsite and will cover classified programs and Special Access Programs (SAP). No Telework. Provide subject matter expertise and serve as an advisor on technical matters involving the security of assigned Information Systems. Maintain and develop System Security Plans (SSP), Security Controls Traceability Matrices (SCTM, Continuous Monitoring Plans (ConMon), Plan of Actions and Milestones (POA … Monitoring and correlating data (e.g., logs, events, activity, etc.) from a variety of sources (e.g., Splunk, Trellix, STIGs, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance. Security sustainment activities (Change Management, Account Management, Media Protection, File Transfers, etc.) Ensure required cybersecurity controls are implemented and validated, to include continuous monitoring actions. Assist in overseeing and managing More ❯