You will ensure that systems and organizational databases are protected from unauthorized access and use, and monitor systems, identify threats, and handle disaster recovery operations. Utilizes detailed knowledge of system functions, security policies, technical security safeguards, and operational or procedural security measures commonly used to implement NIST SP 800-53 security controls. What You'll Be Doing: Perform assessments … required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports. Periodically conduct a review of each system's audits and monitors corrective actions until all actions are closed. Contribute to and potentially lead the planning and implementation of large programs in the function, and regularly interfaces … communication skills Ability to Mentor, provide guidance and instructional aide to Mid-level and Junior ISSOs Familiarity with conducting research and analysis. Familiarity with network and informationsystem security principles and best practices. Familiarity with controlling, labeling, virus scanning, and appropriately transferring data (uploading/downloading) between informationsystems at varying classification levels. Ability to More ❯
passion for keeping pace with rapidly evolving technology advancements and leveraging your knowledge on a highly collaborative team to deliver state-of-the-art capabilities. The InformationSystem Security Engineer (ISSE) designs, implements, and manages security solutions for information systems. Their responsibilities include ensuring systems meet security standards, conducting risk assessments, and recommending mitigation strategies. … standards, such as NIST, RMF, and ICD 503. • Vulnerability Management: Conducting vulnerability scans, analyzing results, and recommending remediation actions. • Security Documentation: Creating and maintaining security documentation, including system security plans, security assessment reports, and risk management plans. • Collaboration and Communication: Working closely with system administrators, network engineers, software developers, and other stakeholders to integrate … security into the system development lifecycle. • Continuous Monitoring: Participating in continuous monitoring activities to ensure ongoing security posture and compliance. • Incident Response: Participating in incident response activities, including investigating security incidents, analyzing malware, and implementing forensic analysis. Required qualifications to be successful in this role: • Education and/or Experience: Bachelor's degree and/or 5 to More ❯
Overview Provide cyber security support for informationsystems, from Assessment and Authorization through Operations and Maintenance. This includes applying Risk Management Framework expertise and supporting developers and engineers in maintaining Authority to Operate compliance for information systems. Required Qualifications Support the assessment … and authorization by applying expert-level knowledge of NIST SP 800-53 (Revision 4 and Revision 5). Draft security documentation, including Plan of Actions and Milestones (POA&Ms), System Security Plans (SSPs), and other designated artifacts for the Body of Evidence (BOE). Participate in project review meetings and provide technical cyber security guidance. Refine, edit, and maintain … training materials, including maintenance of a small training/demonstration network, execute training class. concerning malicious code threats and assist in preparation of a daily report to senior management on the current status of a threat and ability to counteract that threat. Write reports for Sponsor on the detailed technical analysis results. Communicate complex technical concepts and project More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Lockheed Martin
We are looking for a Classified Cyber Security/InformationSystems Security Manager (ISSM) for an exciting opportunity to lead a team of 18 InformationSystem Security Officers (ISSO) within the RMS classified cybersecurity group. The position is located in Colorado Springs, CO and will support multiple Department of Defense (DoD) programs. The selected candidate … will guide and mentor the ISSO team to ensure compliance through the implementation of mandatory informationsystem security tasks on assigned informationsystems utilizing various government guidance publications (e.g., NISPOM, DoD 8500 series, NIST, CNSSI, DAAPM, etc.) in support of development and operations. Responsibilities of the InformationSystem Security Manager (ISSM) include … but are not limited to: • Overseeing and directing day-to-day informationsystem security operations, providing expert guidance on all technical security matters as the ISSM. • Attracting, retaining, and developing top cyber talent to ensure a skilled and effective classified cyber security team. • Coordinating and managing interactions with government authorization authorities to facilitate and maintain 100% active More ❯
Assessment & Authorization (A&A), execution of Continuous Monitoring Plans, and facilitation of Security Controls Assessments. Administer and monitor Risk Management Framework (RMF) steps and activities throughout the system lifecycle to maintain an appropriate security posture. Implement cybersecurity programs, policies, and procedures for assigned systems. Maintain working knowledge of current and upcoming events, system functions, policies, safeguards … and processes. Coordinate with applicable stakeholders across the enterprise to ensure security compliance and readiness. Maintain Authorization to Operate (ATO) packages for assigned systems within the designated A&A System of Record (e.g., eMASS, XACTA 360, Keystone). Review and analyze audit logs (e.g., Splunk, Windows EVTX, Linux syslogs) to detect potential anomalies or threats. Perform validation checks to … compliance/vulnerability scans and manual checks to identify and mitigate risks. Execute ISSO-specific tasks as outlined in program security plans. Deliver cybersecurity education, training, and awareness to system users as required by the ISSM. Basic Qualifications: Active Top Secret clearance with SCI eligibility. Bachelor's degree in Cybersecurity, InformationSystems, or related discipline, and/ More ❯
Information Assurance, IAVA, System Security Plans (SSPs), RMF, Windows, Linux, Authorization to Operate, Verification and Validation, Security+, Security X, CASP+, NIST 800-53 Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI … last five (05) years). At least twelve (12) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, Information Security, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar processes may be substituted for a … Security+ Certification or Security X (previously known as the CASP+) Certification required Must have experience as ISSO working independently, and/or on teams maintaining secure informationsystem operations in isolated, connected and standalone environments. Must have at least five (05) years of experience using tools to support IAVA management. Must have at least five (05) years More ❯
experience, certifications, industry training and more. Join us to drive positive, lasting change that moves missions and the government forward! Accenture Federal Services is seeking an InformationSystem Security Officer (ISSO) to apply cybersecurity and Risk Management Framework (RMF) experiences to Amazon Web Service (AWS) cloud platform, to include infrastructure, applications, data, and people. If … with engineering and networking teams on the cloud platform's deployment What You'll Need: 5 years of experience implementing NIST 800-53, Rev 4 and the Risk Management Framework (RMF) 5 years of experience with Windows and/or Linux environments 5 years of experience using information security and assurance practices and principles 5 years … factors, including but not limited to office location, role, skill set and level of experience. Accenture Federal Services offers a wide variety of benefits. You can find more information on benefits here. We accept applications on an on-going basis and there is no fixed deadline to apply. The pay range for the states of California, Colorado, Hawaii More ❯
ManTech seeks a motivated, career and customer-oriented Senior Computer and InformationSystems Manager to join our team in DC, Maryland, and Virginia (DMV) area. In this role you will plan, direct, or coordinate activities in such fields as network design and implementation, network device troubleshooting, data processing, informationsystems, systems analysis, and computer programming. The … Computer and InformationSystems Manager is recognized as an expert in the areas of network device interoperability, cyber security processes, and the protection of technical architecture. They lend thought leadership and advice to engagement teams in developing creative solutions to client problems. The individual is responsible to oversee, lead, and manage IT troubleshooting, management, technical refresh … Analyze, review, recommend changes as appropriate for processes to keep technology and processes efficient and aligned with mission, laws, regulations, and policies Minimum Qualifications: Bachelor's Degree in Information Technology, Computer Science, ManagementInformationSystems or a related field and 10+ years of related experience Previous Network Operations Center (NOC) or IT Operations experience More ❯
features, develop reporting, define best practice business processes and maintain strong security controls. With a strong functional understanding of budgeting, forecasting, and strategic planning activities, the position provides strategic system guidance and expertise to support and optimize Adaptive Planning for internal Finance and campus stakeholders. Position acts as a liaison between InformationSystems and supported units, particularly … models and dimensions. Analyzes and documents business processes and needs, understands the scope of modifications, creates effective design specifications, and participates in the development and testing/evaluation of system design, integration and reporting efforts. Provides project management expertise for supported units for system implementations and business process enhancements. Develops detailed plans, ensures targets are being … well as other external systems) to ensure that data is flowing efficiently and correctly between the systems. Performs data clean-up activities when data becomes out of sync. Evaluates system impact as a result of available upgrades, including patches/fixes, and business change requests. Leads discussions with users to assist them with understanding impacts and how to appropriately More ❯
Description Position Title : InformationSystems Security Officer (ISSO)/InformationSystems Security Manager (ISSM) Location : Arlington, VA (Remote) Clearance Level : Secret Responsibilities will include, but are not limited to : Ensure cybersecurity is integrated in all phases of the lifecycle sustainment and proactively support the Government's efforts to maintain, update and continuously monitor Chief of Staff … CoS) application's security posture, in accordance with the Risk Management Framework (RMF). Ensure cybersecurity is integrated in all phases of the lifecycle sustainment and proactively support the Government's efforts to maintain, update and continuously monitor Chief of Staff (CoS) application's security posture, in accordance with the Risk Management Framework (RMF). Identify … and authorization requirements. Qualifications Required qualifications Bachelor's Degree in related field of study or equivalent experience. Minimum of three years of experience, one within DoD. Certifications: Certified InformationSystems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified InformationSystems Auditor (CISA), CompTia Security +, Certified in Risk and InformationSystemsMore ❯
the Ft. Meade, MD customer. Our work locations range from North and South Laurel, Columbia, Annapolis Junction, Linthicum and Ft. Meade, MD. ISSO Job Summary: The InformationSystem Security Officer (ISSO) is integral to our mission of safeguarding our information systems. The ISSO collaborates with cross-functional teams to develop and maintain a robust security … they meet requirements for processing classified information and perform vulnerability/risk assessments to support certification and accreditation. Provide configuration management for informationsystem security software, hardware, and firmware, and manage changes to systems, assessing their security impact. Prepare and review security documentation, including System Security Plans (SSPs) and Assessment and Authorization … ensuring they are resilient against threats and vulnerabilities. This role requires a deep understanding of security engineering principles and a proactive approach to risk management throughout the system lifecycle. Primary Responsibilities: Perform and review technical security assessments to identify vulnerabilities and ensure compliance with information assurance (IA) standards and regulations. Validate and verify systemMore ❯
System Administrator GES is seeking a skilled Systems Administrator to join the I3TS team supporting DTRA. The I3TS program provides enterprise-wide IT support to enable DTRA's InformationManagement & Technology Directorate (ITD) to consolidate, modernize, and continuously innovate the delivery of IT services and mission capabilities to DTRA's internal and external mission partners … operating in CONUS and OCONUS locations. The candidate will be responsible for ensuring the security and integrity of IT systems by applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerability management processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will … The candidate must be able to work in a high-energy environment and adapt to shifting priorities. Key Responsibilities Continuous upkeep, monitoring, analysis, and response to InformationSystem, network and security events. STIG Application and Compliance: o Implement and maintain Security Technical Implementation Guides (STIGs) across various systems and applications. o Conduct regular STIG compliance checks using More ❯
IMPACT Participation in iterative software development teams with adherence to all reporting requirements. Meeting with stakeholders, analyzing requirements, user stories, and related artifacts to determine technical specifications for the system environments. Coordinating with technical teams responsible for the cloud hosting infrastructures in order to establish and maintain the environments used by the program for the development, test, and deployment … Maintain environments at the latest security posture. Environment and Server layout and configuration maintenance to Industry standards and best practices. Remediate app/package installations. Rapid prototyping to refine system requirements and technical specifications of the system and its operating environments. Experience in cloud application (Azure/AWS) architecture. Experience in developing enterprise and solution-level architectural designs. … code design, management, and version control techniques. Exposure to project management skills and/or project-based work structures, project lifecycle models, etc. Knowledge of system and software quality assurance best practices and methodologies. Confidence and experience with AWS Cloudformation. Strong communication and documentation skills. Technical experience with large scale system integration. Build, migrate More ❯
Cloud System Administrator - Secret - Huntsville, AL Level E4/E5 MASC-F Job Location: Redstone Gateway 4122 Rideout Rd, Huntsville, AL (Hybrid - 2 days a week in office W/TH) Clearance: Secret (must be current and active) Relocation: Will consider candidates willing to relocate Compensation: Level E4 - 140-150K (9 years' experience); Level E5 150-170K … years' experience. Job Description Our Client seeking a highly motivated and experienced Cloud System Administrator to join our dynamic MASC-F (Missile and Space Command - Force) team in support of the Missile Defense System. You will be responsible for ensuring vulnerability remediation and security management (system hardening, log management, configuration management (i.e. … Demonstrated experience in one or more of the following: Linux Servers, DNS servers, Domain controllers, network storage devices and Client or Dell servers 3 Years' experience with Linux Operating System Administration (i.e., RHEL8, etc.) Demonstrated experience designing, configuring, and installing informationsystems such as routers, servers, switches, storage systems and laptops. Typically has 9 years' experience in More ❯
lifecycle. The IAE is also responsible for capturing and refining information protection requirements to ensure their integration into informationsystems acquisitions and informationsystem development through purposeful security design or configuration. Personnel shall be knowledgeable of best practices when implementing security controls including software engineering methodologies, security engineering methodologies, security engineering principles, and … TS/SCI with CI Polygraph Requirements/Responsibilities: • Knowledge of and experience with ICD 503 and the Government's certification and accreditation process • Proficient with networks, computer components, system protocols, and COTs technology • Knowledge of system methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers … Linux, Unix, Mac OS • Technical experience in configuring and supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configuration management, system maintenance, integration testing, and informationsystem engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services More ❯
lifecycle. The IAE is also responsible for capturing and refining information protection requirements to ensure their integration into informationsystems acquisitions and informationsystem development through purposeful security design or configuration. Personnel shall be knowledgeable of best practices when implementing security controls including software engineering methodologies, security engineering methodologies, security engineering principles, and … TS/SCI with CI Polygraph Requirements/Responsibilities: • Knowledge of and experience with ICD 503 and the Government's certification and accreditation process • Proficient with networks, computer components, system protocols, and COTs technology • Knowledge of system methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers … Linux, Unix, Mac OS • Technical experience in configuring and supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configuration management, system maintenance, integration testing, and informationsystem engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services More ❯
lifecycle. The IAE is also responsible for capturing and refining information protection requirements to ensure their integration into informationsystems acquisitions and informationsystem development through purposeful security design or configuration. Personnel shall be knowledgeable of best practices when implementing security controls including software engineering methodologies, security engineering methodologies, security engineering principles, and … TS/SCI with CI Polygraph Requirements/Responsibilities: • Knowledge of and experience with ICD 503 and the Government's certification and accreditation process • Proficient with networks, computer components, system protocols, and COTs technology • Knowledge of system methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers … Linux, Unix, Mac OS • Technical experience in configuring and supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configuration management, system maintenance, integration testing, and informationsystem engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services More ❯
lifecycle. The IAE is also responsible for capturing and refining information protection requirements to ensure their integration into informationsystems acquisitions and informationsystem development through purposeful security design or configuration. Personnel shall be knowledgeable of best practices when implementing security controls including software engineering methodologies, security engineering methodologies, security engineering principles, and … TS/SCI with CI Polygraph Requirements/Responsibilities: • Knowledge of and experience with ICD 503 and the Government's certification and accreditation process • Proficient with networks, computer components, system protocols, and COTs technology • Knowledge of system methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers … Linux, Unix, Mac OS • Technical experience in configuring and supporting, at minimum, VMware, Xen, Hyper V • Technical experience in software engineering, program design and implementation, configuration management, system maintenance, integration testing, and informationsystem engineering Geographic Locations: Chantilly, Virginia Travel: Some ( 25%) Company Information: LV8D Solutions is a provider of engineering services More ❯
well. I came across your profile on Clearance job and wanted to reach out regarding a unique opportunity. I work for Cedge, and we're looking to hire a System engineer . I think your experience in System engineering is a great fit for this role. Client : NGA Clearance : TS/SCI needed Location : Springfield/Chantilly , VA … Provides expert advice to the government in the areas of relating vision, strategy, plans, needs, requirements and process and capability developments Operates at the level of integrating multiple Major System Acquisitions across organizational, agency, department and governmental/national boundaries Oversees and coordinates the work of Senior and Mid-level contractor Systems Engineers Works closely with both the OSP … or related STEM degree program Expert-level professional technical experience in government or industry in relevant work areas including: DoD/IC Acquisition Process, Requirements Process, PPBES Process or system engineering of large complex System of Systems or Service Oriented Architecture/Cloud Environments systems engineering, systems integration or systems development experience Technical leadership experience with IC mission More ❯
changes. A complete understanding of the systems engineering process from concept phase through systems test. Must be adept at: Architecture Development, Functional Analysis, Requirements Allocation & Traceability, Trade-off Studies, System Synthesis and System Evaluation (Integration & Verification Testing). Knowledge in Public Key Infrastructure (PKI) including Transmission Layer Security (TLS) and certificate/key management. Model-Based Systems Engineering … MBSE) experience Proven experience applying the left side of the V-model, including requirements analysis, system architecture, and design. Hands-on experience with systems integration and verification testing (right side of the V-model). Proficiency in Python scripting for test automation, diagnostics, and system-level debugging in embedded environments. US Citizenship required Active US Government security clearance … DOD SECRET minimum) Willingness to travel up to 10% of time Preferred Additional Skills: Understanding of Key ManagementSystems including Electronic Key ManagementSystem (EKMS) and Key Management Infrastructure (KMI) as they impact the design of End Cryptographic Units (ECUs) Proven track record of success and experience in the architecture, design, analysis, integration More ❯
benefits as provided. Benefits are subject to change with or without notice. Procurement Systems Analyst Responsibilities Include: Run metrics reports and queries to support data quality and data management activities related to various acquisition activities. Develop applications in Power Platform. Collect, analyze, and report data to meet customer needs by loading, extracting and presenting data from multiple data … and assistance awards. Assist with gathering data to respond to data calls and Freedom of Information Act (FOIA) requests. Provide oversight and monitor acquisition informationsystem requests within the ticketing system. Provide system administration assistance in support of Federal, DoD, and Navy eBusiness- related systems such as running reports, activities involved with activation/… deactivation of accounts, administrative support that assist eBusiness with gathering data and auditing of accounts, troubleshooting eBusiness system applications as problems arise or reported in the ticketing system Performs other job-related duties as assigned Procurement Systems Analyst Experience, Education, Skills, Abilities requested: Bachelor's Degree from an accredited college or university. Bachelor's Degree in a Technical More ❯
of business needs, technology trends, and project management best practices to deliver high-quality solutions that meet budget, schedule, and performance requirements. Responsibilities: Analyze and translate complex system requirements into technical specifications. Design, develop, and implement hardware and software solutions using industry-standard methodologies and tools. Manage project scope, schedule, and budget throughout the development lifecycle. Collaborate … with stakeholders, including clients, developers, and engineers, to ensure alignment and successful project completion. Troubleshoot and resolve technical issues in hardware, software, and systems. Optimize system performance and efficiency. Document system design, development, and deployment processes. Stay up-to-date with the latest technology trends and advancements. May support additional IT initiatives, such as security assessments and vulnerability … solving and analytical skills. Excellent communication and collaboration skills. Ability to work independently and as part of a team. Passion for technology and continuous learning. Experience with project management methodologies (Agile, Waterfall). Experience with various programming languages and technologies. Experience with hardware and software design principles. Strong written and verbal communication skills. Ability to prioritize tasks and More ❯
by solving the most daunting challenges facing our customers. Visit to learn how we're keeping people around the world safe and secure. Program Overview Provides IC data management support to modernize mega data repositories, dataflow management, data provenance and compliance validation, and streaming solutions. About The Role Cyber Systems Engineer Location: Annapolis Junction, MD Clearance … day-to-day security operations, helping to protect systems handling classified information. Evaluate and implement security solutions to meet evolving cybersecurity requirements. Conduct vulnerability and risk assessments to support system certification and accreditation (C&A). Manage system changes and assess the impact on security, ensuring compliance and minimizing risks. Provide configuration management of system security hardware, software, and firmware. Prepare and maintain key security documentation, including: System Security Plans (SSPs) Risk Assessment Reports Certification and Accreditation Packages System Requirements Traceability Matrices (SRTMs) Support security authorization activities aligned with DoD frameworks (e.g., NISCAP, DIACAP). Serve as a trusted advisor and security authority, helping to shape and enforce IT security programs and More ❯
We are seeking a highly skilled and motivated IT System Engineer (SE) to join our technical team. As an IT System Engineer, you will be responsible for designing, implementing, and maintaining the infrastructure that powers our operations. Your expertise will ensure the stability, security, and efficiency of our IT systems. This role requires a proactive problem-solver with … a deep understanding of system architecture, network management requirement management processes. The ideal candidate will have prior experience with capturing customer requirements, designing and implementing enterprise level system such as ServiceNow. Responsibilities: • Design and develop ServiceNow system architecture, including hardware and software components, to meet functional requirements. • Collaborate with cross-functional teams to … gather, analyze, and manage system requirements, ensuring alignment with business objectives. • Document system requirements, configurations, procedures, and best practices. • Install, configure, and deploy server resources provided by third-party cloud services. and software updates. • Create technical documentation for system configurations and maintaining system-related reports. • Prepare and document standard operating procedures and protocols for all designed More ❯
team dedicated to mission success. The ideal candidate will demonstrate technical leadership, the ability to collaborate across multi-disciplinary teams, and the skill to translate mission requirements into effective system solutions. The Senior Systems Engineer will apply systems engineering principles, DoD acquisition frameworks, and industry best practices to ensure program success across the full system lifecycle. Systems Engineer … Experience Active TS/SCI Clearance 8+ years of experience in systems engineering or related roles, with direct support to DoD or Federal programs Strong background in requirements development, system architecture, and lifecycle engineering Knowledge of DoD acquisition processes (e.g., DoD 5000, JCIDS, SE processes) Experience with systems engineering tools such as DOORS, Cameo, or Model-Based Systems Engineering … MBSE) frameworks Experience conducting system integration, verification & validation (V&V), and test planning Familiarity with DoD mission areas of sustainment, maintenance, and life cycle support; prior project experience preferred Understanding of cybersecurity, risk management, and mission assurance for defense systems Ability to analyze complex technical problems and provide innovative solutions Strong written and verbal communication skills, with More ❯