Job Title: InformationSystem Security Manager Level 2 Location(s): Annapolis Junction, MD Hours: Regular Full-Time Salary Range: $133k/yr - $200k/yr Clearance Requirements: This position requires a current and active TS/SCI with FS Poly at the time of application. What you will be doing: Provide management support for a … program, organization, system, or enclave s Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing InformationSystem Security policies, standards, and methodologies. Manage operational security posture for an InformationSystem or program to ensure InformationSystem Security policies, standards, and procedures are established … and followed. Provide management of security aspects of the InformationSystem and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide managementMore ❯
company where your contributions truly make a difference! INFORMATIONSYSTEMS SECURITY OFFICER I opening! Must ALREADY have a TS/SCI polygraph clearance! The InformationSystem Security Officer I provides support for a program, organization, system, or enclave's information assurance program. Provides support for proposing, coordinating, implementing, and enforcing informationsystems security policies, standards, and methodologies. Maintains operational security posture for an informationsystem or program to ensure informationsystems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the informationsystem and performs day-to-day security operations of … they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for informationsystem security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs More ❯
Job Title: InformationSystem Security Engineer I (ISSE I) Location(s): Annapolis Junction, MD Hours: Regular Full-Time Salary Range: $120k/yr - $175k/yr Clearance Requirements: This position requires a current and active TS/SCI with Full Scope Poly at the time of application. What you will be doing: The contractor shall provide cyber … security and security engineering services for the Fort Meade customer including system security engineering, cybersecurity risk assessments, and security architecture support. The ISSE shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established cybersecurity standards and regulations and recommended mitigation strategies. This includes: Participate as a security engineering representative on … engineering teams for the design, development, implementation, and/or integration of: Secure networking, computing, and enclave environments Cybersecurity architectures, systems, or system components Supports the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures Applies knowledge of cybersecurity policy, procedures, and workforce structure to design, develop, and implement secure networking More ❯
mission-critical systems by implementing and managing security controls in compliance with Department of Defense (DoD) cybersecurity policies and standards. Key Responsibilities: Develop, implement, and maintain security documentation, including System Security Plans (SSPs), Plan of Action & Milestones (POA&Ms), and risk assessments. Support system accreditation and continuous monitoring activities under the Risk Management Framework (RMF). … Conduct vulnerability assessments, track remediation efforts, and verify that security requirements are effectively implemented. Monitor system compliance with DoD, NIST, and organizational security policies. Participate in security audits, inspections, and assessments. Collaborate with system administrators, engineers, and program teams to ensure secure system design and operations. Support incident response by documenting and coordinating response actions. Provide recommendations … to improve system security posture and support security awareness initiatives. Required Qualifications: Active Secret clearance (or higher). Current CompTIA Security+ certification (IAT Level II). 2-5 years of hands-on experience in information security, cybersecurity compliance, or system security roles. Familiarity with DoD cybersecurity policies, RMF processes, STIGs, and NIST frameworks. Experience developing or More ❯
other project team members Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of Cybersecurity architectures, systems, or system components Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures Support security planning, assessment, risk analysis, and risk management Identify overall security requirements for the proper handling of Government data Provide security planning, assessment, risk analysis, and risk management Perform system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements Recommend system-level solutions to resolve security requirements Twelve (12) years experience as an ISSE … IASAE Level 2 is required. Clearance Required: Active TS/SCI with Poly Minimum Education: Bachelor's degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required. In lieu of a Bachelor's degree, four (4) additional years of ISSE experience may be substituted. More ❯
Job Summary We are seeking a skilled and dedicated InformationSystems Security Engineer to join our team. In this role, you will be responsible for safeguarding our organization's informationsystems and ensuring the integrity, confidentiality, and availability of data. You will work closely with IT teams to implement security measures, respond to incidents, and maintain … Clearance Bachelors Degree with 5 years experience 2+ years experience in cybersecurity or information assurance in a DoD environment Active CISSP or similar certificate Proven experience in system security or a related field. Strong understanding of network security concepts including OSPF and APIs. Familiarity with ITIL practices related to incident management and service delivery. Knowledge … of disaster recovery planning and execution. Experience with CI/CD processes for secure software development. Proficiency in using monitoring tools such as PRTG for system performance analysis. Excellent analytical skills and attention to detail in identifying vulnerabilities. Knowledge of Federal and/or DoD Information Security regulations, publications, and policy Applicants will be accepted until July More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Wood Consulting Services, Inc
Overview InformationSystems Security Officer, Senior Location: Annapolis Junction, Maryland, USA Job Type: Full-Time Shift: Days Telework: None Salary Range: $180,000 tp $200,000 Starting salary is based on minimum education and years of experience and increases based on education and/or experience. Overview: Join a mission-critical program supporting national security as an Information … Support configuration management (CM) for security-relevant software, hardware, and firmware. Analyze threats and implement best practices for incident detection, reporting, and remediation. Maintain detailed records of system components including servers, routers, firewalls, and workstations. Ensure systems maintain an appropriate operational security posture. Assist the InformationSystem Security Manager (ISSM) in maintaining IA posture … across systems and enclaves. Develop and maintain Certification & Accreditation (C&A) documentation in accordance with federal guidelines. Create and update System Security Plans (SSPs) and related documentation. Administer user identification and authentication mechanisms. Qualifications Basic Qualifications: Minimum 10 years of experience as an ISSO, independently or on teams managing secure systems in various environments. At least 5 years of More ❯
MANTECH seeks a motivated, career and customer-oriented Senior InformationSystem Security Representative (ISSR) to join our team in Washington, DC. Responsibilities include but are not limited to: Provides overall configuration management infrastructure and environment to the product development team. Developing or modifying CM plans, policies, and procedures tailored to the complexity and scope of … the developmental or operational system Ensure that FBI ISs are operated, maintained, and disposed of in accordance with the internal security policies and practices outlined in the approved Security Assessment and Authorization (SAA) package. Manage the SAA process for new FBI ISs and legacy FBI ISs migrating into the GRC application Provide baseline security controls to the system owner, contingent upon the IS's security categorization, type of information processed and entity type. Provide a recommendation to the Authorizing Official, in consultation with the system owner, regarding systems' impact levels and ISs' authorization boundary Initiate, coordinate, and recommend to the FBI Authorizing Official all Interconnection Security Agreement (ISAs), Memorandum of Understanding (MOUs), and Memorandum More ❯
The ISSO will be responsible for ensuring the confidentiality, integrity and availability of enterprise informationsystems by supporting compliance efforts, assessing security controls, managing risk, and maintaining system authorizations under frameworks such as the NIST Risk Management Framework (RMF). This position plays a vital role in securing IT infrastructure and supporting continuous monitoring and … audit readiness. Essential Duties & Responsibilities: Serve as the primary security point of contact for assigned informationsystems throughout the lifecycle. Develop, maintain, and update security documentation including System Security Plans (SSP), Security Assessment Reports (SAR), and Plan of Action and Milestones (POA&M). Conduct risk assessments, vulnerability scans, and facilitate remediation and migration. Ensure the implementation … and assessment of security controls in accordance with NIST SP 800-53 and other applicable standards. Support the preparation, submission and maintenance of Authorization to Operate (ATO) packages. Monitor system security configurations, audit logs, and patch management for compliance and threat detection. Collaborate with IT staff, system owners, developers, and auditors to ensure security posture aligns More ❯
The ISSO will be responsible for ensuring the confidentiality, integrity and availability of enterprise informationsystems by supporting compliance efforts, assessing security controls, managing risk, and maintaining system authorizations under frameworks such as the NIST Risk Management Framework (RMF). This position plays a vital role in securing IT infrastructure and supporting continuous monitoring and … audit readiness. Essential Duties & Responsibilities: Serve as the primary security point of contact for assigned informationsystems throughout the lifecycle. Develop, maintain, and update security documentation including System Security Plans (SSP), Security Assessment Reports (SAR), and Plan of Action and Milestones (POA&M). Conduct risk assessments, vulnerability scans, and facilitate remediation and migration. Ensure the implementation … and assessment of security controls in accordance with NIST SP 800-53 and other applicable standards. Support the preparation, submission and maintenance of Authorization to Operate (ATO) packages. Monitor system security configurations, audit logs, and patch management for compliance and threat detection. Collaborate with IT staff, system owners, developers, and auditors to ensure security posture aligns More ❯
and other cyber security personnel receive the necessary technical and security training to carry out their duties. Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation. Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media. Develop and execute security assessment plans that include verification that … the features and assurances required for each protection level functioning. Maintain a and/or applicable repository for all system authorization documentation and modifications. Institute and implement a Configuration Control Board (CCB) charter. Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents. Ensure proper protection or corrective measures have been … training, and awareness program, to include attending, monitoring, and presenting local cyber security training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed. Assess changes in the system, its environment, and operational needs that could affect the authorization. Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview. More ❯
objectives and needs of the U.S. Navy in the Washington, DC area. The position is contingent upon award of contract. Responsibilities: Responsible for the cybersecurity of a program, organization, system, or enclave. Oversees and ensures that the appropriate operational security posture (e.g., network and system security, physical and environmental protection, personnel security, incident handling, security training and awareness … is implemented and maintained for an informationsystem or program. Advises the Authorizing Official (AO), an informationsystem owner, or the Chief Information Security Officer (CISO) on the security of an informationsystem or program. Collect, review, and analyze information to make recommendations to the Government. Cloud … Chief Information Officer CIN A-4C-1340 Key Management Infrastructure (KMI) Operating Account Manager CIN W-3B-1500 EKMS Manager NEC 741A InformationSystem Security Manager NEC N72Z CVN Propulsion Plant Local Area Network (PPLAN) Manager Desired: Strong written and verbal communication skills Prior experience with DoD/DoN procedures and Policies (DoD More ❯
review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established IA standards and regulations and recommended mitigation strategies. This includes: Validates and verifies system security requirements definitions and analysis and establishes system security design Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency security policy and enterprise solutions Supports the building of security architectures Enforces the design and implementation of trusted relations among external systems and architecture Assesses and mitigates system security threats/risk throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and … Minimum TS/SCI with ability to obtain Polygraph. Qualifications Bachelor's degree from an accredited university ideally in Computer Science, Information Assurance, Information Security System Engineering or related field with a minimum of 15+ years of experience as an InformationSystems Security Engineer (ISSE) or Network Engineer on programs and/or More ❯
Are you interested in using your skills to help shape the Cyber, Security, & Intel space? If so, look no further. Amentum is seeking a Senior InformationSystem Security Engineer to join our team of passionate individuals in San Antonio, TX. In this role you will support challenging, mission-critical projects that make a direct impact on the … provide imaginative solutions that enable the adoption of innovation and emerging technologies that create opportunities for transformative change. Responsibilities: The duties and responsibilities of the Senior InformationSystem Security Engineer (ISSE) include, but are not limited to, the following: Experience creating custom dashboards, writing queries, building, and generating reports, and setting up alerts and notifications using all … future products/systems thus ensuring these systems can be accredited based on compliance with the Joint Special Access Program Implementation Guide (JSIG). Recommend the components to implement system security requirements using intimate knowledge of security design best practices for information systems. throughout the system development life cycle to support the generation of the security More ❯
InformationSystem Security Officer (ISSO) L Garde is a full-service design, development, manufacturing, and qual-test supplier to Tier 1 primes and government agencies. We provide systems engineering and skilled technicians to make your Skunk Works-type project a reality. With over 50 years of aerospace and defense expertise, our deployable systems test the limits of … what's possible in the harshest of environments - in space, on the moon, and even on other planets. We are seeking a diligent and resourceful InformationSystem Security Officer (ISSO) to join our team. If you are a proactive cybersecurity professional with a passion for protecting critical systems and making an impact in national security, this role … a success. Key Responsibilities: Cybersecurity & Compliance •Support implementation, monitoring, and continuous improvement of cybersecurity controls in accordance with the Risk Management Framework (RMF). •Maintain and update System Security Plans (SSPs), POA&Ms, risk assessments, and continuous monitoring documentation. •Perform vulnerability assessments, penetration testing, and security audits using tools such as Nessus, SCAP/STIG, or PowerShell. More ❯
Description Powder River Industries, LLC provides technical services across the entire system development life cycle (SDLC). As a prime we are responsible for complete end to end systemmanagement for a customer's mission system. This includes a data center, integrated logistics support, COOP, and disaster recovery. As a subcontractor we are providing services from … use of innovative methods to complex problems by collaborating with subject matter experts and program managers in one or more of the following areas: critical infrastructure and industrial control system cyber security, information security. Develop and give cybersecurity training to domestic and international partners Provide cybersecurity expertise as part of multi-disciplinary and multi-lab teams providing … security functionality to ensure uniform application of Agency security policy and enterprise solutions. Contributes to security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations Preferred familiarization with Sentinel One Preferred familiarization with IDS/IPS Solutions Preferred familiarization with MECM Perform other duties as assigned. Preferred Qualifications: Familiarization with Sentinel More ❯
to be part of a team that is helping the government solve major national security challenges in the space domain? We need your help. The Information Technology System Engineer will provide dedicated IT support to the Space Warfighting and Analysis Center (SWAC) and the Space Security and Defense Program (SSDP) as a member of the Enduring High … solving problems effectively and collaborating directly with customers and team members during critical IT initiatives implementation. Duties and Responsibilities : Install, configure, test, and maintain operating systems, application software, and systemmanagement tools Ensure maximum efficiency of SWAC and SSDP IT systems, from manufacturing to distribution Integrate COTS & GOTS products for enhanced system security, operations, and performance … Maintain security, backup, and redundancy strategies for mission resilience Support EHLC/AC&W IT leads in achieving IT goals and objectives Write and maintain custom scripts to improve system efficiency and minimize human intervention Build and maintain operational checklists (daily, weekly, monthly, yearly) as well as TTPs and SOPs Assess and mitigate system threats/risks throughout More ❯
meet with the customer 1-2 times annually. Responsibilities: Collaboratively monitor and report the security posture for mission critical systems, including communicating risk and recommended mitigations. Collaborate with development, system administration, and test teams to maintain secure applications and environments. Perform Risk Management Framework (RMF) tasking in support of system accreditation and authorization for system … have active DoD Secret clearance or higher. Must have USMC or USN ISSO experience. Bachelor's degree (preferable IT-related), 5+ years' experience in cybersecurity, information assurance, system administration, or equivalent combination to reflect knowledge and experience. Must possess certifications that meet or exceed DoD 8140 ISSM role requirements (ex. CompTIA Security+, CISSP). Demonstrated knowledge of … DoD Cybersecurity policies, procedures, and practices (including RMF and NIST SP 800-53 publications) to achieve and maintain system accreditation and authorization. Experience developing RMF artifacts and implementing security controls. Experience analyzing, summarizing, and reporting security vulnerabilities and weaknesses verbally and in writing to the appropriate level of leadership. Knowledge and experience using DoD tools and capabilities for vulnerability More ❯
to identify points of vulnerability, non- compliance, establish information assurance standards and confirm regulations and recommend mitigation strategies are being met. The ISSE will validate and verify system security requirements and build IA systems deployed to operational environments. Responsibilities: Participate as the primary security engineering representative on engineering teams for the design, development, implementation, and evaluation of … architectures, systems, or system components. Knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments. Make recommendations on the system- level to resolve security requirements. Perform system or network designs that encompass multiple enclaves, to include those with differing data protection. Provide security planning, assessment, risk analysis, and … risk management. Advocate and recommend system- level solutions to resolve security requirements. Monitors and suggests improvement to IA policy. Interact with customers, IT staff. And high- level corporate officers to define and achieve required IA objects. Provide assistance to ensure that the architecture and design of informationsystems are functional and secure, including program of record systemsMore ❯
Joint Tactics and Technologies (JTT) is looking for motivated Mid-Level/Senior InformationSystem Security Engineers in Philadelphia, PA! We are a Service-Disabled Veteran Owned Small Business (SDVOSB) specializing in cybersecurity engineering. We offer outstanding benefits and opportunities for leadership development. This work is in support of Naval Surface Warfare Center - Philadelphia. Tasking includes: • Assist … with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments (PIA), and … IT and CS vulnerability-level risk assessments. • Execute security control testing as required by a risk assessment or annual security review (ASR). • Mitigate and remediate IT and CS system level vulnerabilities for all assets within the boundary per STIG requirements • Develop and maintain Plans of Actions and Milestones (POA&M) in Enterprise Mission Assurance Support Service (eMASS). More ❯
Description The Senior InformationSystems Security Officer (ISSO) supports the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract. The candidate will: Contribute to the development and deployment of program information security for assigned systems to meet the program and enterprise requirements, policies, standards, guidelines and procedures Implement Assessment and … Authorization (A&A) processes under the Risk Management Framework (RMF), as well as product development and product maintenance for assigned systems Perform security compliance continuous monitoring (CONMON) Participate in security assessments and audits Prepare and presents technical reports and briefings Contribute to the identification of root causes, the prioritization of threats, and recommend/implement corrective action Provide … mentoring and technical leadership within the information security program team Explore the enterprise and industry for the evolving state of industry knowledge and methods regarding information security best practices Support development of enterprise-wide information security policies, standards, guidelines and procedures that may reach across multiple stakeholder organizations Travel Required: Up to 10% of More ❯
ManTech seeks a motivated, career and customer-oriented Senior Computer and InformationSystems Manager to join our team in DC, Maryland, and Virginia (DMV) area. In this role you will plan, direct, or coordinate activities in such fields as network design and implementation, network device troubleshooting, data processing, informationsystems, systems analysis, and computer programming. The … Computer and InformationSystems Manager is recognized as an expert in the areas of network device interoperability, cyber security processes, and the protection of technical architecture. They lend thought leadership and advice to engagement teams in developing creative solutions to client problems. The individual is responsible to oversee, lead, and manage IT troubleshooting, management, technical refresh … Analyze, review, recommend changes as appropriate for processes to keep technology and processes efficient and aligned with mission, laws, regulations, and policies Minimum Qualifications: Bachelor's Degree in Information Technology, Computer Science, ManagementInformationSystems or a related field and 10+ years of related experience Previous Network Operations Center (NOC) or IT Operations experience More ❯
Senior InformationSystems Security Engineer Cyber Security V Redstone Arsenal Huntsville, AL HX5 is an award-winning provider of engineering, research and development, and technical services to clients such as NASA and the Department of Defense. Founded in 2004, HX5 is a fast-growing veteran- and woman-owned company with locations nationwide. HX5 is currently seeking a qualified … Senior InformationSystems Security Engineer (ISSE) supports the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract at Schriever Space Force Base in Colorado Springs, CO. Essential Duties and Responsibilities: Contribute to the development and deployment of program information security for assigned systems to meet the. program and enterprise requirements … policies, standards, guidelines and procedures Implement Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF), as well as product development and product maintenance for assigned systems Perform security compliance continuous monitoring (CONMON) Participate in security assessments and audits Prepare and presents technical reports and briefings Contribute to the identification of root causes, the prioritization of More ❯
Senior InformationSystems Security Engineer Cyber Security V Schriever Space Force Base Colorado Springs, CO HX5 is an award-winning provider of engineering, research and development, and technical services to clients such as NASA and the Department of Defense. Founded in 2004, HX5 is a fast-growing veteran- and woman-owned company with locations nationwide. HX5 is currently … seeking a qualified Senior InformationSystems Security Engineer (ISSE) supports the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract at Schriever Space Force Base in Colorado Springs, CO. Essential Duties and Responsibilities: Contribute to the development and deployment of program information security for assigned systems to meet the. program … and enterprise requirements, policies, standards, guidelines and procedures Implement Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF), as well as product development and product maintenance for assigned systems Perform security compliance continuous monitoring (CONMON) Participate in security assessments and audits Prepare and presents technical reports and briefings Contribute to the identification of root causes More ❯
being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first! InformationSystems Auditor In this role you will Conduct technical cyber and communications vulnerability assessments of computer networks, other technology (OT) systems telecommunications and other communication systems that directly support … an equal opportunity employer. All terms and conditions of employment are established without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, veteran status, or any other protected category under applicable federal, state, and local laws. More ❯