Evolver Federal is seeking an InformationSystem Security Officer (ISSO) to support its Federal client in Springfield, VA in managing all aspects of security for assigned National Security Systems (NSS) to ensure the data stored, processed, and transmitted by the assigned system(s) is protected in accordance with the appropriate Agency policies and NIST … Analyze continuous monitoring, configuration management, vulnerability management, asset management, software management and self-reported data to identify risk and work with System Teams to develop a plan to mitigate security risk for assigned system(s). Provide analysis and feedback on security artifacts (SSPs, CPs, MOUs, MOAs, ISAs). Provide … in/in support of the Federal Government to include evaluating and validating security controls for NSS systems. 3 years of experience as an InformationSystem Security Office (ISSO) in/in support of the Federal government, developing and maintaining comprehensive System Security Plans (SSPs) (Sections 1 & 2), Contingency Plans (CPs), Contingency Plan Tests (CPTs), Privacy More ❯
hypersonic and nuclear deterrence and warfighter readiness. Visit for more details. Responsibilities Join Arcfield's rapidly expanding team of Cyber professionals! We are seeking talented Mid-level Cloud InformationSystems Security Engineers (ISSE), to provide critical Systems Engineering and Technical Assistance (SETA) support for a prestigious National customer. Note: An offer for this position is contingent upon contract … identification of projects' security requirements Supporting security recommendations for systems using Cloud services Supporting network design reviews and security testing for the customer's networks Supporting the coordination with system development teams to ensure network security standards are being followed and implemented correctly Supporting additional security requirements, based on RMF or as the result of security issues that put … systems at risk Supporting the review and analysis of new systems (hardware and software) and providing recommendations concerning their security Supporting the review of Security Requirements Traceability Matrices (SRTMs), System Security Plans (SSPs) and other IA documentation for completeness Qualifications Required: BS 5-7 Years, MS 3-5, PhD 0-2 Must possess and have the ability to maintain More ❯
missions in cyber and space defense, space exploration, hypersonic and nuclear deterrence and warfighter readiness. Visit for more details. Responsibilities This is a position for an InformationSystem Security Manager who will join the Cyber Security Team in Chantilly, VA. We are looking for a driven self-starter who works well in a fast-paced team environment. … wide application of technical principles, theories and concepts. Provides technical solutions to a wide range of difficult problems. Independently determines and develops approach to solutions. Prepare, maintain, and implement System Security Plans that accurately depict the customer's contractual requirements. Develop, implement, enforce, and monitor security policies across systems to maintain compliance with organizational and federal standards. Responsible for … within the security program and ensure business needs and mission are met. Works directly with program managers, engineers, and the information assurance team on all phases of system life cycle development. Leads the team working with US Government Security Control Assessors (SCAs) and Authorizing Officials (AOs) to develop a comprehensive RMF package including System Security Plans More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency Security Policy and Enterprise Solutions. Supports the building of security architectures. Enforces the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking … operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification, authentication; and authorization More ❯
an InformationSystems Security Engineer (ISSE) to support Product Manager Information Warfare Cyber Development (PdM IWCD) and their external mission partners. The ISSE will provide system security engineering services and to support the Government to ensure core security engineering principles are implemented into assigned programs informationsystems architecture. The role of the ISSE … include the following. Other duties may be assigned. Apply current systems security engineering methods, practices and technologies to the architecture, design, development, evaluation, and integration of systems to maintain system security. Reviews and understands the living documents, how to address scans; and how to update the plan of actions/milestones (POAM). Develop, implement, and enforce informationsystems security policies ensuring system security requirements are addressed during all phases of the acquisition and InformationSystem (IS) lifecycle. Evaluate proposed security architectures and designs and provide input as to the adequacy of those security designs to meet required security compliance objectives. Contribute to the security planning, assessment, risk analysis, risk managementMore ❯
Tyto Athene is searching for a Senior InformationSystem Security Officer (ISSO) to be responsible for the overall handling of information assurance expertise for a large, complex IT infrastructure program in Washington DC. Systems are deployed using a public cloud service provider to deliver advanced capabilities to the Federal government using IaaS, PaaS, and SaaS … upgrades. Responsibilities: Developing and updating security authorization packages in accordance with the client's requirement and compliant with FISMA. Core documents that you will be responsible for are the System Security Plan (SSP), Risk Assessment Report, Security Assessment Plan and Report, Contingency Plan, Incident Response Plan (IRP), Standard Operating Procedures (SOP), Plan of Actions and Milestones (POA&M), Remediation … Plans, Configuration Management Plan (CMP), etc. Validate that protective measures for physical security are in place to support the system's security requirements Maintain an inventory of hardware and software for the informationsystem Develop, coordinate, test, and train staff on Contingency Plans and Incident Response Plans Manage emerging and defined risks associated with More ❯
habits, ability to complete tasks independently while working also working collaboratively as part of a team. Responsibilities: ● Provide senior-level information security expertise in architecture, design, and system integration. ● Proven experience with the Risk Management Framework (RMF), the Federal ATO process, and hands-on expertise in information assurance (IA) tools and compliance standards. … maintain security documentation (CMP, IRP, ISCP, POA&M) to ensure compliance with customer and federal policies. ● Develop and maintain Security Assessment and Authorization (SAA) packages to obtain/maintain system ATO/ATT approvals. ● Identify, track, and remediate IA vulnerabilities, coordinating fixes with infrastructure and development teams. ● Conduct and review vulnerability and compliance scans (e.g., Tenable.io, Nessus Pro, NMap … with the full Risk Management Framework (RMF) processes ● Experience with security documentation, such as Contingency Management Plan (CMP), Incident Response Plan (IRP), InformationSystem Contingency Plan (ISCP), Plan of Action and Milestones (POA&Ms) ● Experience with Authorization-to-Operate (ATO), Security Assessment and Authorization (SAA) packages ● Experience conducting and addressing and vulnerability and More ❯
complex security challenges and making a tangible impact, this is the role for you. Your greatest work is ahead! Responsibilities Include: Enhancing security posture by supporting the program, organization, system, or enclave's information assurance initiatives and enforcing security policies, standards, and methodologies. Overseeing security operations for informationsystems, managing daily security aspects, evaluating security … solutions for classified processing, and conducting vulnerability and risk assessments for accreditation. Managing configuration and system integrity by administering configuration management (CM) for security software, hardware, and firmware, ensuring compliance with security controls, and assessing the impact of system changes. Developing and maintaining security documentation, including System Security Plans (SSPs), Risk Assessment Reports, Certification & Accreditation … C&A) packages, and System Requirements Traceability Matrices (SRTMs). Ensuring compliance with security authorization activities following the InformationSystem Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Providing technical expertise in security policies and operations, supporting the implementation and maintenance of security measures, and collaborating with stakeholders to strengthen More ❯
complex security challenges and making a tangible impact, this is the role for you. Your greatest work is ahead! Responsibilities Include: Enhancing security posture by supporting the program, organization, system, or enclave's information assurance initiatives and enforcing security policies, standards, and methodologies. Overseeing security operations for informationsystems, managing daily security aspects, evaluating security … solutions for classified processing, and conducting vulnerability and risk assessments for accreditation. Managing configuration and system integrity by administering configuration management (CM) for security software, hardware, and firmware, ensuring compliance with security controls, and assessing the impact of system changes. Developing and maintaining security documentation, including System Security Plans (SSPs), Risk Assessment Reports, Certification & Accreditation … C&A) packages, and System Requirements Traceability Matrices (SRTMs). Ensuring compliance with security authorization activities following the InformationSystem Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Providing technical expertise in security policies and operations, supporting the implementation and maintenance of security measures, and collaborating with stakeholders to strengthen More ❯
Arlington, Virginia, United States Hybrid / WFH Options
Alpha Omega Integration LLC
Job Title: InformationSystem Security Officer (ISSO) Clearance Required: DHS Public Trust EOD, US Citizen (Secret or above preferred) Work Location: Hybrid; Onsite 2 days a week in Arlington, VA (applicant must be based within a commutable distance (1-2 hours) from Arlington, VA) Alpha Omega is searching for an InformationSystem Security Officer … Ms to ensure weaknesses are resolved in accordance with their scheduled completion dates. Create of Waivers or Risk Acceptance Memos to assist in the effective management of system risks. Conduct an annual assessment in accordance with guidance in the DHS Information Security Performance Plan. Review and update security authorization documents as needed, but at least … annually Conduct Contingency Plan tests at least annually and update the plan. Perform system self-assessments as part of the customer's Ongoing Authorization program. Monitor and respond to Information Security Vulnerability Management (ISVM)/Patch Management. Provide audit support for assigned systems (Financial, A-123, FISMA, internal, DHS, etc.), throughout the audit (Pre, During More ❯
Engineer (ISSE) to support the design, implementation, and integration of secure systems and architecture across the enterprise. The ISSE will serve as a technical security expert, working closely with system architects, developers, and cybersecurity professionals to ensure that security is embedded throughout the system lifecycle. This role is critical in protecting systems from cyber threats and ensuring compliance … with applicable risk management frameworks, policies, and standards. Essential Duties & Responsibilities: Design and implement secure system architectures and technical solutions that meet security requirements. Integrate security controls into systems and applications during design, development, and implementation phases. Conduct security engineering analysis, risk assessments, and technical trade-off studies. Develop and maintain documentation such as System Security … Plans (SSPs), Security Control Traceability Matrices (SCTMs), and risk assessment reports. Support system accreditation efforts under RMF, NIST SP 800-53, and other applicable frameworks. Work with ISSOs, System Owners, and Developers to resolve security findings and ensure timely remediation. Evaluate system configurations and provide recommendations to harden operating systems, networks, and applications. Perform vulnerability assessments, interpret More ❯
Job Number: R InformationSystems Security Officer The Opportunity: Are you looking for an opportunity to share your experience in cybersecurity engineering and architecture to safeguard our nation? As a systems security and network security engineer, you can identify the tools, applications, and systems needed to assess vulnerabilities and recommend the best solution and security strategy. We need … audiences, including senior management. Implement infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. Perform risk and vulnerability assessments in network, system, and application areas. Leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise. Join us. The world can't wait. You Have … log integrity checks, anomaly detection, performance validation, processing account request, auditing group memberships and reviewing account changes, assuring adherence to media control policies , preventing unauthorized data exposures, and maintaining system compliance with SAP policies Experience with network engineering functions, including Windows, Linux, and virtual operating systems, security tools, platforms, and technologies, including network and web application firewalls, web proxy More ❯
behind the mission-critical systems that keep our nation secure. Ready to engineer solutions that matter? Primary Responsibilities The Digital Modernization Sector at Leidos is seeking a dynamic InformationSystems Security Officer (ISSO) to support cloud modernization initiatives for the United States Coast Guard (USCG) at Command, Control, Communication, Computer, Cyber, and Intelligence Service Center (C5ISC) in the … value to the mission. Key Responsibilities Serve as the lead ISSO for cloud-hosted systems, ensuring compliance with NIST RMF, FedRAMP, FISMA, and other applicable frameworks. Develop and maintain system security plans (SSPs), risk assessments, POA&Ms, and other security documentation. Coordinate with system owners, cloud architects, and DevSecOps teams to implement security controls and continuous monitoring strategies. … assessors, and government stakeholders during security reviews and assessments. Stay current on cloud security trends, threats, and regulatory changes. Support cross-functional coordination across engineering, cybersecurity, and program management teams Promote continuous improvement through feedback loops and process refinement Ensure alignment with USCG mission priorities and Leidos delivery standards Basic Qualifications: Bachelor's degree in a related field More ❯
Information Assurance, Nessus, RMF, Windows, Linux, WireShark, System Security Plans, Authorization to Operate, Verification and Validation, NIST, PKI, Scripting Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI clearance w/active … last five (05) years). At least fourteen (14) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, Information Security, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar processes may be substituted for a … bachelor's degree. Certified InformationSystem Security Professional Certification (CISSP) or Security X (previously known as the CASP+) Certification required Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience using Customer tools. Must have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. More ❯
OVERVIEW: We are seeking a highly skilled cybersecurity- focused Program Manager to lead a dynamic team of cybersecurity professionals supporting a critical Information Security program. This role is ideal for a strategic leader with strong communication and organizational skills and cyber/information security background who can manage cross-functional teams, ensure contract deliverables, and drive … successful execution of federal cybersecurity initiatives. The Program Manager will serve as the primary point of contact for all project oversight, performance management, reporting, and client engagement. GENERAL DUTIES: Provide overall program leadership and oversight across all contract activities. Manage day-to-day operations, team schedules, and performance metrics. Serve as the primary interface with stakeholders, including the … assurance activities and maintain program documentation. Evaluate and support special projects to enhance program efficiency or cybersecurity posture. REQUIRED QUALIFICATIONS: Bachelor's or master's degree in Project Management, InformationSystems, Cybersecurity, Business Administration, or a related field preferred. In lieu of a degree, at least ten (10) years of progressively responsible program managementMore ❯
Description: Project ManagementSystems Support Analyst (15.23) OCT Consulting is a business management and technology consulting firm that provides support to Federal Government clients. We provide consulting services in the areas of Strategy, Process Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information Technology. Responsibilities and Duties … OCT currently has an opening for a Project ManagementSystems Support Analyst to work with a technology division within the office of a federal client. The Systems Support Analyst will manage project documentation, facilitate Agile processes, and ensure effective stakeholder coordination and project execution. Day to day responsibilities include: Administration: Administer SharePoint or MS Teams sites and other … support team and Agile best practices. Provide Agile training to new team members. Facilitate project closing and document lessons learned. Project Support: Provide and adhere to established project management best practices as identified in the Project Management Body of Knowledge (PMBOK). Consult and assist in enforcing project scoping. Support quality control of project deliverables and More ❯
Computer Systems Engineer/Architect (Senior) Clearance: TS/SCI clearance The Computer Systems Engineer/Architect designs, develops and implements solutions to complex applications problems, system administration issues, or network concerns. Perform systemsmanagement and integration functions. Required Qualifications: Bachelor's degree or years of experience equivalent to a bachelor's degree in computer science, computer … engineering, software engineering, information technology systems IAT Level III certifications: CASP+ CE, CCNP Security, CISSP (or Associate), GCED, or GCIH Operating System/Compute Environment certification to include Microsoft Windows, Red Hat Enterprise Linux (RHEL), Amazon Web Services (AWS), Microsoft Azure or another OS/CE. Minimum 3-5 years of experience architecting technology solutions in cloud … years of experience overseeing IC technology projects or similar experience SDLC and/or DevSecOps experience Master's Degree or higher in systems engineering, software engineering, computer science, information technology/systems or equivalent. More ❯
Piper Companies is seeking an experienced Information Security Engineer to take a holistic, system-of-systems approach to enhancing and aligning cybersecurity, information assurance, and informationmanagement efforts across PEO C3N. T his role is fully onsite located in Aberdeen, Maryland . Requirements of the Information Security Engineer: Cybersecurity … Engineering Development and System Support: Deliver systems engineering and analytical support to the C5 community, ensuring compliance with AR 25-2 and related Department of the Army guidance to maintain the security and reliability of Mission Command and Communications systems. Conduct specialized C5ISR engineering assessments focused on cybersecurity integration, providing expert advice to government stakeholders on technical risks that … with standard office automation tools. Responsibilities may include identifying hardware/software requirements, software installation, troubleshooting application issues, applying security patches, and diagnosing network problems. Maintain an approved inventory system to track 100% of accountable equipment. Qualifications of the Information Security Engineer: 10+ years of experience in TCP/IP networking, information security, and managing More ❯
in the federal space. Our work culture fosters collaboration, creativity, and continuous learning. Job Summary: The Senior Systems Architecture Engineer - SharePoint Architect is responsible for designing and implementing enterprise system architectures that integrate software, hardware, and communication components to meet organizational and project-specific requirements. This role focuses on developing scalable, secure, and compliant SharePoint architectures while ensuring interoperability … and alignment with open systems standards and frameworks. The engineer provides strategic technical guidance, evaluates system performance, and ensures solutions are designed for future growth and cross-functional compatibility. Key Responsibilities: Design and implement SharePoint architectures to meet business, functional, and technical requirements across enterprise environments. Develop and maintain high-level system design diagrams, architectural documentation, and technical … Align SharePoint solutions with IEEE Open Systems Environment (OSE) standards and other applicable federal or enterprise IT standards. Design and enforce compliance with a Common Operating Environment (COE) for system interoperability and standardization. Evaluate and troubleshoot complex system architecture and workflow challenges; propose corrective actions and process improvements. Integrate SharePoint environments with APIs, application platforms, and external software More ❯
employs more than 5,800 professionals who engineer and deploy automated, secure, and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Why join M.C. Dean? Our people are inspired by the way engineering and innovation enhance customer outcomes, improve lives, and change the world for the better. We are … of specific components of complex hardware/software systems to include requirements elicitation, analysis and functional allocation, conducting systems requirements reviews, developing concepts of operation and interface standards, developing system architectures, and performing technical/non-technical assessment and management as well as end-to-end flow analysis. Assist with the automation and optimization of engineering processes. … with industry partners and OEMs to implement the latest and best-in-bread capabilities to meet customer emerging needs. Analyze user requirements and concept of operations documents to develop system requirements specifications. Identify and document operational, functional, and technical requirements. Perform systems engineering assessments (upgrades, system improvements, lifecycle refreshes, migrations, new deployments), develop conceptual design solutions, and create More ❯
ll Do: Lead technical security assessments of complex computing environments, identifying vulnerabilities and ensuring compliance with top-tier Information Assurance (IA) standards. Develop, validate, and verify robust system security requirements and designs that safeguard sensitive data across diverse networks and enclaves. Design, implement, and integrate advanced IA and security systems-including multi-enclave environments with varying data … Collaborate closely with architects and developers to embed security functionality that aligns with Agency policies and enterprise-wide solutions. Support the development and enforcement of secure architectures, trusted external system relationships, and comprehensive risk mitigation strategies. Drive continuous security planning, risk analysis, and certification efforts throughout the program lifecycle. Provide expert review and feedback on certification and accreditation documentation … to ensure rigorous compliance. Apply your expertise in system security engineering across areas such as risk management, intrusion detection, contingency planning, incident handling, and security testing. Guide security authorization activities in line with DOD system frameworks, ensuring our systems meet the highest standards of cybersecurity.What You Bring: Strong experience with system security engineering principles and More ❯
Job Description Ready for What's Next? Kratos has SkillBridge opportunities for System Administrators and Information Security System Officers Learn the skills to take your career to the next level. At Kratos, we encourage an entrepreneurial spirit balanced with discipline. We work hard, and take care of our customers, employees, and families. Recognized as thought leaders … in our industry, we are motivated by creating and delivering innovative solutions to our nation and global customers. Kratos has an exciting opportunity for a System Administrator to support system and infrastructure engineers, cloud engineers, and developers in the execution of information assurance and security. The System Administrator will be assisting with the compliance of … for the security administration, patching, configuration, and security of classified government systems. Reports to the InformationSystems Security Manager, and perform all tasks assigned to them. The System Administrator will also support vulnerability and risk assessment analyses to gain and maintain Assessment & Authorization and maintain configuration management for informationsystem security software More ❯
supports collateral Top Secret and below programs performing all aspects of DoD RMF activities. The successful candidate possesses experience ranging from documenting, implementing, and assessing security controls to performing system monitoring and compliance assessment activities. We need a team player who enjoys expanding and sharing their knowledge and training others. You will be involved in all aspects of cybersecurity … effective information security program. Job Duties/Responsibilities: Lead and work as part of an integrated team to develop and maintain RMF body of evidence documentation (e.g., System Security Plan, Security Controls Traceability Matrix, Plan of Action and Milestones, etc.) using Enterprise Mission Assurance Support Service (eMASS) and/or Microsoft products such as Word, Excel, PowerPoint … individuals Develop and execute security control assessment procedures to verify conformance with control requirements as part of ongoing continuous monitoring and authorization assessment activities Work in close coordination with system administrators and other cyber team members to ensure systems are operated, maintained, and disposed of in accordance with applicable security policies and procedures and notify the ISSO/ISSM More ❯
Force Solutions, a business unit within GoldenTech, has an opening at our Hill Air Force Base, Utah location for a Systems Administrator. The selected candidate will join our Information Services team and play an essential role in supporting our mission of Strategic Deterrence through continual improvement and innovation. The position will have the following duties and responsibilities: Provide … virtual and physical) Design, install, configure, and troubleshoot Microsoft Active Directory Implement and test software patches and security fixes Perform installation, configuration, hardening, and testing for new or updated system changes Develop, execute, and improve documentation for installation, configuration, hardening, and operations and maintenance tasks Document activities, status, and issues worked on Provide input to and follow Configuration Management processes Ensure adherence to IT infrastructure standards, policies, and procedures Perform root cause analysis and resolve system and application faults and errors Maintain working knowledge of Microsoft Active Directory, Group Policy Objects (GPOs), DHCP, DNS, and PowerShell General understanding of antivirus and vulnerability scanning software Basic understanding of Security Information and Event ManagementMore ❯
has an opening for a Systems Security Administrator to work with a technology division within the Federal Bureau of Investigation (FBI). This role will require strong knowledge of system administration and attention to detail. Day to day responsibilities include: Establish and manage Role-Based Access Controls (RBAC) for the Unified Financial ManagementSystem Secret Cloud … UFMS-SC), including Writing, Itemizing and Recording Expenses (WIRE) as a component of UFMS-SC, the Asset ManagementSystem (AMS), the U.S. Treasury Bureau of Fiscal Service's Invoice Processing Platform (IPP), the U.S. Treasury Bureau of Fiscal Service's Over-the-Counter Channel Application (OTCNet), and the U.S. Treasury Bureau of Fiscal Service's G-Invoicing … Application (G-INV) (Other applications may subsequently be added). Coordinate with applicable InformationSystem Security Officers (ISSOs) and other system support personnel to ensure user access is implemented and maintained in accordance with governing policies and procedures. Provide recommendations for developing new user security groups, profiles, and roles to ensure compliance with governing policies and More ❯