The ISSO will be responsible for ensuring the confidentiality, integrity and availability of enterprise informationsystems by supporting compliance efforts, assessing security controls, managing risk, and maintaining system authorizations under frameworks such as the NIST Risk Management Framework (RMF). This position plays a vital role in securing IT infrastructure and supporting continuous monitoring and … audit readiness. Essential Duties & Responsibilities: Serve as the primary security point of contact for assigned informationsystems throughout the lifecycle. Develop, maintain, and update security documentation including System Security Plans (SSP), Security Assessment Reports (SAR), and Plan of Action and Milestones (POA&M). Conduct risk assessments, vulnerability scans, and facilitate remediation and migration. Ensure the implementation … and assessment of security controls in accordance with NIST SP 800-53 and other applicable standards. Support the preparation, submission and maintenance of Authorization to Operate (ATO) packages. Monitor system security configurations, audit logs, and patch management for compliance and threat detection. Collaborate with IT staff, system owners, developers, and auditors to ensure security posture aligns More ❯
The ISSO will be responsible for ensuring the confidentiality, integrity and availability of enterprise informationsystems by supporting compliance efforts, assessing security controls, managing risk, and maintaining system authorizations under frameworks such as the NIST Risk Management Framework (RMF). This position plays a vital role in securing IT infrastructure and supporting continuous monitoring and … audit readiness. Essential Duties & Responsibilities: Serve as the primary security point of contact for assigned informationsystems throughout the lifecycle. Develop, maintain, and update security documentation including System Security Plans (SSP), Security Assessment Reports (SAR), and Plan of Action and Milestones (POA&M). Conduct risk assessments, vulnerability scans, and facilitate remediation and migration. Ensure the implementation … and assessment of security controls in accordance with NIST SP 800-53 and other applicable standards. Support the preparation, submission and maintenance of Authorization to Operate (ATO) packages. Monitor system security configurations, audit logs, and patch management for compliance and threat detection. Collaborate with IT staff, system owners, developers, and auditors to ensure security posture aligns More ❯
and other cyber security personnel receive the necessary technical and security training to carry out their duties. Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation. Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media. Develop and execute security assessment plans that include verification that … the features and assurances required for each protection level functioning. Maintain a and/or applicable repository for all system authorization documentation and modifications. Institute and implement a Configuration Control Board (CCB) charter. Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents. Ensure proper protection or corrective measures have been … training, and awareness program, to include attending, monitoring, and presenting local cyber security training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed. Assess changes in the system, its environment, and operational needs that could affect the authorization. Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview. More ❯
objectives and needs of the U.S. Navy in the Washington, DC area. The position is contingent upon award of contract. Responsibilities: Responsible for the cybersecurity of a program, organization, system, or enclave. Oversees and ensures that the appropriate operational security posture (e.g., network and system security, physical and environmental protection, personnel security, incident handling, security training and awareness … is implemented and maintained for an informationsystem or program. Advises the Authorizing Official (AO), an informationsystem owner, or the Chief Information Security Officer (CISO) on the security of an informationsystem or program. Collect, review, and analyze information to make recommendations to the Government. Cloud … Chief Information Officer CIN A-4C-1340 Key Management Infrastructure (KMI) Operating Account Manager CIN W-3B-1500 EKMS Manager NEC 741A InformationSystem Security Manager NEC N72Z CVN Propulsion Plant Local Area Network (PPLAN) Manager Desired: Strong written and verbal communication skills Prior experience with DoD/DoN procedures and Policies (DoD More ❯
review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established IA standards and regulations and recommended mitigation strategies. This includes: Validates and verifies system security requirements definitions and analysis and establishes system security design Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency security policy and enterprise solutions Supports the building of security architectures Enforces the design and implementation of trusted relations among external systems and architecture Assesses and mitigates system security threats/risk throughout the program life cycle Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and … Minimum TS/SCI with ability to obtain Polygraph. Qualifications Bachelor's degree from an accredited university ideally in Computer Science, Information Assurance, Information Security System Engineering or related field with a minimum of 15+ years of experience as an InformationSystems Security Engineer (ISSE) or Network Engineer on programs and/or More ❯
Are you interested in using your skills to help shape the Cyber, Security, & Intel space? If so, look no further. Amentum is seeking a Senior InformationSystem Security Engineer to join our team of passionate individuals in San Antonio, TX. In this role you will support challenging, mission-critical projects that make a direct impact on the … provide imaginative solutions that enable the adoption of innovation and emerging technologies that create opportunities for transformative change. Responsibilities: The duties and responsibilities of the Senior InformationSystem Security Engineer (ISSE) include, but are not limited to, the following: Experience creating custom dashboards, writing queries, building, and generating reports, and setting up alerts and notifications using all … future products/systems thus ensuring these systems can be accredited based on compliance with the Joint Special Access Program Implementation Guide (JSIG). Recommend the components to implement system security requirements using intimate knowledge of security design best practices for information systems. throughout the system development life cycle to support the generation of the security More ❯
InformationSystem Security Officer (ISSO) L Garde is a full-service design, development, manufacturing, and qual-test supplier to Tier 1 primes and government agencies. We provide systems engineering and skilled technicians to make your Skunk Works-type project a reality. With over 50 years of aerospace and defense expertise, our deployable systems test the limits of … what's possible in the harshest of environments - in space, on the moon, and even on other planets. We are seeking a diligent and resourceful InformationSystem Security Officer (ISSO) to join our team. If you are a proactive cybersecurity professional with a passion for protecting critical systems and making an impact in national security, this role … a success. Key Responsibilities: Cybersecurity & Compliance •Support implementation, monitoring, and continuous improvement of cybersecurity controls in accordance with the Risk Management Framework (RMF). •Maintain and update System Security Plans (SSPs), POA&Ms, risk assessments, and continuous monitoring documentation. •Perform vulnerability assessments, penetration testing, and security audits using tools such as Nessus, SCAP/STIG, or PowerShell. More ❯
Description Powder River Industries, LLC provides technical services across the entire system development life cycle (SDLC). As a prime we are responsible for complete end to end systemmanagement for a customer's mission system. This includes a data center, integrated logistics support, COOP, and disaster recovery. As a subcontractor we are providing services from … use of innovative methods to complex problems by collaborating with subject matter experts and program managers in one or more of the following areas: critical infrastructure and industrial control system cyber security, information security. Develop and give cybersecurity training to domestic and international partners Provide cybersecurity expertise as part of multi-disciplinary and multi-lab teams providing … security functionality to ensure uniform application of Agency security policy and enterprise solutions. Contributes to security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations Preferred familiarization with Sentinel One Preferred familiarization with IDS/IPS Solutions Preferred familiarization with MECM Perform other duties as assigned. Preferred Qualifications: Familiarization with Sentinel More ❯
to be part of a team that is helping the government solve major national security challenges in the space domain? We need your help. The Information Technology System Engineer will provide dedicated IT support to the Space Warfighting and Analysis Center (SWAC) and the Space Security and Defense Program (SSDP) as a member of the Enduring High … solving problems effectively and collaborating directly with customers and team members during critical IT initiatives implementation. Duties and Responsibilities : Install, configure, test, and maintain operating systems, application software, and systemmanagement tools Ensure maximum efficiency of SWAC and SSDP IT systems, from manufacturing to distribution Integrate COTS & GOTS products for enhanced system security, operations, and performance … Maintain security, backup, and redundancy strategies for mission resilience Support EHLC/AC&W IT leads in achieving IT goals and objectives Write and maintain custom scripts to improve system efficiency and minimize human intervention Build and maintain operational checklists (daily, weekly, monthly, yearly) as well as TTPs and SOPs Assess and mitigate system threats/risks throughout More ❯
meet with the customer 1-2 times annually. Responsibilities: Collaboratively monitor and report the security posture for mission critical systems, including communicating risk and recommended mitigations. Collaborate with development, system administration, and test teams to maintain secure applications and environments. Perform Risk Management Framework (RMF) tasking in support of system accreditation and authorization for system … have active DoD Secret clearance or higher. Must have USMC or USN ISSO experience. Bachelor's degree (preferable IT-related), 5+ years' experience in cybersecurity, information assurance, system administration, or equivalent combination to reflect knowledge and experience. Must possess certifications that meet or exceed DoD 8140 ISSM role requirements (ex. CompTIA Security+, CISSP). Demonstrated knowledge of … DoD Cybersecurity policies, procedures, and practices (including RMF and NIST SP 800-53 publications) to achieve and maintain system accreditation and authorization. Experience developing RMF artifacts and implementing security controls. Experience analyzing, summarizing, and reporting security vulnerabilities and weaknesses verbally and in writing to the appropriate level of leadership. Knowledge and experience using DoD tools and capabilities for vulnerability More ❯
to identify points of vulnerability, non- compliance, establish information assurance standards and confirm regulations and recommend mitigation strategies are being met. The ISSE will validate and verify system security requirements and build IA systems deployed to operational environments. Responsibilities: Participate as the primary security engineering representative on engineering teams for the design, development, implementation, and evaluation of … architectures, systems, or system components. Knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments. Make recommendations on the system- level to resolve security requirements. Perform system or network designs that encompass multiple enclaves, to include those with differing data protection. Provide security planning, assessment, risk analysis, and … risk management. Advocate and recommend system- level solutions to resolve security requirements. Monitors and suggests improvement to IA policy. Interact with customers, IT staff. And high- level corporate officers to define and achieve required IA objects. Provide assistance to ensure that the architecture and design of informationsystems are functional and secure, including program of record systemsMore ❯
Joint Tactics and Technologies (JTT) is looking for motivated Mid-Level/Senior InformationSystem Security Engineers in Philadelphia, PA! We are a Service-Disabled Veteran Owned Small Business (SDVOSB) specializing in cybersecurity engineering. We offer outstanding benefits and opportunities for leadership development. This work is in support of Naval Surface Warfare Center - Philadelphia. Tasking includes: • Assist … with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments (PIA), and … IT and CS vulnerability-level risk assessments. • Execute security control testing as required by a risk assessment or annual security review (ASR). • Mitigate and remediate IT and CS system level vulnerabilities for all assets within the boundary per STIG requirements • Develop and maintain Plans of Actions and Milestones (POA&M) in Enterprise Mission Assurance Support Service (eMASS). More ❯
Description The Senior InformationSystems Security Officer (ISSO) supports the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract. The candidate will: Contribute to the development and deployment of program information security for assigned systems to meet the program and enterprise requirements, policies, standards, guidelines and procedures Implement Assessment and … Authorization (A&A) processes under the Risk Management Framework (RMF), as well as product development and product maintenance for assigned systems Perform security compliance continuous monitoring (CONMON) Participate in security assessments and audits Prepare and presents technical reports and briefings Contribute to the identification of root causes, the prioritization of threats, and recommend/implement corrective action Provide … mentoring and technical leadership within the information security program team Explore the enterprise and industry for the evolving state of industry knowledge and methods regarding information security best practices Support development of enterprise-wide information security policies, standards, guidelines and procedures that may reach across multiple stakeholder organizations Travel Required: Up to 10% of More ❯
ManTech seeks a motivated, career and customer-oriented Senior Computer and InformationSystems Manager to join our team in DC, Maryland, and Virginia (DMV) area. In this role you will plan, direct, or coordinate activities in such fields as network design and implementation, network device troubleshooting, data processing, informationsystems, systems analysis, and computer programming. The … Computer and InformationSystems Manager is recognized as an expert in the areas of network device interoperability, cyber security processes, and the protection of technical architecture. They lend thought leadership and advice to engagement teams in developing creative solutions to client problems. The individual is responsible to oversee, lead, and manage IT troubleshooting, management, technical refresh … Analyze, review, recommend changes as appropriate for processes to keep technology and processes efficient and aligned with mission, laws, regulations, and policies Minimum Qualifications: Bachelor's Degree in Information Technology, Computer Science, ManagementInformationSystems or a related field and 10+ years of related experience Previous Network Operations Center (NOC) or IT Operations experience More ❯
Senior InformationSystems Security Engineer Cyber Security V Redstone Arsenal Huntsville, AL HX5 is an award-winning provider of engineering, research and development, and technical services to clients such as NASA and the Department of Defense. Founded in 2004, HX5 is a fast-growing veteran- and woman-owned company with locations nationwide. HX5 is currently seeking a qualified … Senior InformationSystems Security Engineer (ISSE) supports the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract at Schriever Space Force Base in Colorado Springs, CO. Essential Duties and Responsibilities: Contribute to the development and deployment of program information security for assigned systems to meet the. program and enterprise requirements … policies, standards, guidelines and procedures Implement Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF), as well as product development and product maintenance for assigned systems Perform security compliance continuous monitoring (CONMON) Participate in security assessments and audits Prepare and presents technical reports and briefings Contribute to the identification of root causes, the prioritization of More ❯
Senior InformationSystems Security Engineer Cyber Security V Schriever Space Force Base Colorado Springs, CO HX5 is an award-winning provider of engineering, research and development, and technical services to clients such as NASA and the Department of Defense. Founded in 2004, HX5 is a fast-growing veteran- and woman-owned company with locations nationwide. HX5 is currently … seeking a qualified Senior InformationSystems Security Engineer (ISSE) supports the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract at Schriever Space Force Base in Colorado Springs, CO. Essential Duties and Responsibilities: Contribute to the development and deployment of program information security for assigned systems to meet the. program … and enterprise requirements, policies, standards, guidelines and procedures Implement Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF), as well as product development and product maintenance for assigned systems Perform security compliance continuous monitoring (CONMON) Participate in security assessments and audits Prepare and presents technical reports and briefings Contribute to the identification of root causes More ❯
being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first! InformationSystems Auditor In this role you will Conduct technical cyber and communications vulnerability assessments of computer networks, other technology (OT) systems telecommunications and other communication systems that directly support … an equal opportunity employer. All terms and conditions of employment are established without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, veteran status, or any other protected category under applicable federal, state, and local laws. More ❯
Risk, Requirements, Architecture Management, Agile, JIRA, and other leading industry product lines. The qualified candidate requires an understanding of Space Systems in order to integrate big picture system and programmatic thinking with Space Segment, Ground Segment and User Segment architectures. The position requires a collaborative approach to gather required data using agile or traditional system engineering … defeat our enemies in battle. In this position, the successful candidate will be responsible for, but not limited to, the following: Develop, document, execute and update portfolio and program system integration processes and products. Incorporate Government-approved GFP/GFE/GFI and Giver/Receiver requirements into the Government Integrated Schedules. Identify and recommend system integration technical … other program acquisition milestones. Plan, manage, and execute continuous integration activities over the life of the contract to include development of entry/exit criteria for each step of system integration flow to ensure that the development/integration/test activities of each step effectively support the delivery of the space system. Support Government oversight of prime contractor More ❯
Visit for more details. Responsibilities Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: The Cross Domain Systems Engineer will support the design, integration, accreditation, and sustainment of Cross Domain Solutions (CDS) used to securely transfer information between … a TS/SCI with Poly Able to support customer's core hours (; Mon - Fri) A Cyber Certification (DoD 8570/8140) 5+ years of Systems Engineering (configuration management, requirements management/writing, architecture, interfaces) experience, preferably in DoD or IC environments Experience leading projects or diverse teams in a DoD or government contracting environment Understanding More ❯
across the organization. Cooperatively validate video production network equipment with the organization's security elements. Research and prepare technical proposals for presentation to the Sponsor's video production management team and security elements. Provide Operations and Maintenance (O&M), upgrades, and content management support for the organization's video network. Utilize network analysis tools to identify … and resolve performance problems. Assist in the development and maintenance of Standard Operating Procedures (SOPs). Support corporate business applications, promoting IT and program management best practices. Provide tools to streamline corporate business processes and systems. Support data-driven decisions by providing access to usable and reliable information quickly and easily. Contribute to improving the accessibility … requirements and reasonable accommodations. Required Experience/Clearance U.S. Citizenship with Current TS/SCI access and Polygraph (required to start). Bachelor's degree in Computer Science, InformationSystems, or a related field. 5+ years of experience in systems engineering, with a focus on network infrastructure and application support. Proven experience in designing, implementing, and maintaining network More ❯
Description Position Title : InformationSystems Security Officer (ISSO)/InformationSystems Security Manager (ISSM) Location : Arlington, VA (Remote) Clearance Level : Secret Responsibilities will include, but are not limited to : Ensure cybersecurity is integrated in all phases of the lifecycle sustainment and proactively support the Government's efforts to maintain, update and continuously monitor Chief of Staff … CoS) application's security posture, in accordance with the Risk Management Framework (RMF). Ensure cybersecurity is integrated in all phases of the lifecycle sustainment and proactively support the Government's efforts to maintain, update and continuously monitor Chief of Staff (CoS) application's security posture, in accordance with the Risk Management Framework (RMF). Identify … and authorization requirements. Qualifications Required qualifications Bachelor's Degree in related field of study or equivalent experience. Minimum of three years of experience, one within DoD. Certifications: Certified InformationSystems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified InformationSystems Auditor (CISA), CompTia Security +, Certified in Risk and InformationSystemsMore ❯
guide engineering teams in taking a multi-discipline approach to requirements engineering, solutions engineering, scheduling, reliability, resiliency, services development, integration, test and evaluation, maintainability and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and Federal Agencies to ensure timely and accurate GEOINT. Location: Patriot Ridge (Springfield, VA)/Chantilly, VA Duties … Guides Mid-level and Junior-level system engineers performing requirements engineering, solutions engineering, scheduling, reliability, resiliency, services development, integration, test and evaluation, maintainability and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and Federal Agencies. Guides the planning, analysis/traceability of user requirements, architectures traceability, procedures, and problems to … automate or improve existing systems and review cloud service capabilities, workflow, and scheduling limitations. Guides Mid-level and Junior-level system engineers developing solutions designs based on analysis of requirements and new technology. Assists the Government in the capture and translation of mission and customer requirements/needs into systems/capability requirements and solutions. Supports the analyses and More ❯
guide engineering teams in taking a multi-discipline approach to requirements engineering, solutions engineering, scheduling, reliability, resiliency, services development, integration, test and evaluation, maintainability, and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and Federal Agencies to ensure timely and accurate GEOINT. Duties may include: Guides Mid-level and Junior-level … system engineers performing requirements engineering, solutions engineering, scheduling, reliability, resiliency, services development, integration, test and evaluation, maintainability, and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and Federal Agencies. Guides the planning, analysis/traceability of user requirements, architectures traceability, procedures, and problems to automate or improve existing systems and … review cloud service capabilities, workflow, and scheduling limitations. Guides Mid-level and Junior-level system engineers developing solutions designs based on analysis of requirements and new technology. Assists the Government in the capture and translation of mission and customer requirements/needs into systems/capability requirements and solutions. Supports the analyses and allocation of requirements to systems architecture More ❯
guide engineering teams in taking a multi-discipline approach to requirements engineering, solutions engineering, scheduling, reliability, resiliency, services development, integration, test and evaluation, maintainability, and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and Federal Agencies to ensure timely and accurate GEOINT. Duties may include: Guides Mid-level and Junior-level … system engineers performing requirements engineering, solutions engineering, scheduling, reliability, resiliency, services development, integration, test and evaluation, maintainability, and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and Federal Agencies. Guides the planning, analysis/traceability of user requirements, architectures traceability, procedures, and problems to automate or improve existing systems and … review cloud service capabilities, workflow, and scheduling limitations. Guides Mid-level and Junior-level system engineers developing solutions designs based on analysis of requirements and new technology. Assists the Government in the capture and translation of mission and customer requirements/needs into systems/capability requirements and solutions. Supports the analyses and allocation of requirements to systems architecture More ❯
Title InformationSystems Security Officer (ISSO)/InformationSystems Security Manager (ISSM) Full-Time/Part-Time Full-Time Description Cyber Intelligence Alliance (CIA) Joint Venture (JV) is seeking an InformationSystems Security Officer (ISSO)/InformationSystems Security Manager (ISSM) (contingent upon award) to support federal client ensuring cybersecurity is integrated … meet assessment and authorization requirements, ensure all releases are Information Assurance (IA) compliant with applicable STIGS, Nessus and Information Assurance Vulnerability Alert (IAVA), assist with system interface agreement process. Identify and mitigate code vulnerabilities as measured by the government provided "Fortify" tool; ensure that Development Teams prioritize findings in accordance with customer priorities and provide … Milestones (POA&M). Candidate should be familiar with and have experience using eMASS Candidate should have experience and familiarity with assessing vulnerability assessment reports and working with customer, system owners and/or Program Managers regarding mitigations, tracking and closure.Requirements for this position shall include: Bachelor's degree or higher in a related field of study or equivalent More ❯