Information System Security Officer (ISSO) Job Category: Security Time Type: Full time Minimum Clearance Required to … Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: None The Opportunity: CACI is seeking a cleared Information System Security Officer (ISSO) to provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operations … IA posture for a system, program, or enclave at Annapolis Junction, MD. Responsibilities: Maintain operational security posture for an information system or program. Provide Cyber Security oversight, guidance, and support in support of Assessment and Authorization ( A&A ) as required by the Federal Information SecurityMore ❯
Cape Fox Facilities Services (CFSS) is seeking clearedSecurity Escorts to support escorting uncleared personnel in cleared environments. Qualified candidates must currently possess Top Secret clearance with SCI eligibility. Responsibilities Include: Develop, maintain, and continuously improve knowledge of written and oral post orders, policies, procedures and … the unauthorized disclosure of sensitive information. Properly cleanse secured areas prior to escorting uncleared personnel into the facility. Follow all company and customer security and safety policies. Travel Requirements 0 - 10% Salary Grade Job Requirements Active, TS/SCI securityclearance Must have 2-4 years … Intelligence Community (IC) and Department of Defense (DoD) classification guidelines and procedures ICD/ICS-705 Be knowledgeable of and demonstrate ability to apply clearedsecurity escorts procedures (i.e. clearances reviews, SCI access) and security policies, prohibited items and reportable incidents. Cape Fox Corporation, its More ❯
Cape Fox Facilities Services (CFSS) is seeking clearedSecurity Escorts to support escorting uncleared personnel in cleared environments. Qualified candidates must currently possess Top Secret clearance with SCI eligibility. Responsibilities Include: Develop, maintain, and continuously improve knowledge of written and oral post orders, policies, procedures and … the unauthorized disclosure of sensitive information. Properly cleanse secured areas prior to escorting uncleared personnel into the facility. Follow all company and customer security and safety policies. Travel Requirements 0 - 10% Salary Grade Job Requirements Active, TS/SCI securityclearance Must have 2-4 years … Intelligence Community (IC) and Department of Defense (DoD) classification guidelines and procedures ICD/ICS-705 Be knowledgeable of and demonstrate ability to apply clearedsecurity escorts procedures (i.e. clearances reviews, SCI access) and security policies, prohibited items and reportable incidents. Cape Fox Corporation, its More ❯
This position is contingent on contract award Description: Enable planning, coordination, and implementation of the organization's information security. Identify current organizational security infrastructure, define future program requirements, and design and implement security related IT systems. Ensure systems provide a high level of data security … the sensitive nature of business and financial data used by TD systems. Design and develop systems that provide a high level of data security and user compartmentalization due to the sensitive nature of business and financial data used by TD systems. Provide support to the ISSM for maintaining … the appropriate operational Cybersecurity posture for a system, program, or enclave Assist in maintaining appropriate operational security posture for an information system or program Provide support to the Government on all matters (technical and otherwise) involving the security of the information system Assist with the management More ❯
Falls Church, Virginia, United States Hybrid / WFH Options
Epsilon Inc
Information Security Analyst II Who is Epsilon: Epsilon is an IT Services company that was founded in 2009 and has become an established leader in providing Information Technology services to both Federal Government and Commercial businesses across the United States. Epsilon is known for its solution-focused and … customer location in Falls Church, VA and have the flexibility to work from home based on business needs. An average day: As Information Security Analyst II, you will be responsible for safeguarding the organization's information assets by monitoring, analyzing, and mitigating security threats. The individual … that supports secure data productization, AI/ML initiatives, automation engineering, and overall pipeline optimization. In this position you will: Implement and maintain security policies, standards, and procedures to protect organizational assets and data. Conduct regular vulnerability assessments and penetration tests to identify and remediate securityMore ❯
This position is contingent on contract award Description: Enable planning, coordination, and implementation of the organization's information security. Identify current organizational security infrastructure, define future program requirements, and design and implement security related IT systems. Ensure systems provide a high level of data security … the sensitive nature of business and financial data used by TD systems. Design and develop systems that provide a high level of data security and user compartmentalization due to the sensitive nature of business and financial data used by TD systems. Provide support to the ISSM for maintaining … the appropriate operational Cybersecurity posture for a system, program, or enclave Assist in maintaining appropriate operational security posture for an information system or program Provide support to the Government on all matters (technical and otherwise) involving the security of the information system Assist with the management More ❯
Type: Full Time Location: Washington, DC Overtime Exempt: No Reports To: ARMADA HQ SecurityClearance Required: Active Top Secret CONTINGENT UPON AWARD Duties & Responsibilities: The Security Specialist III (SEA) shall maintain a program that consistently brings security issues to the attention of the government. … The Security Specialist III (SEA) shall support training course administration to include; scheduling students for internal and external training, and customer service, including the granting of training credit and reciprocal credit. The Security Specialist III (SEA) shall maintain distribution list of customers for product inventories. Support … internal and external SEA events to include occasional CONUS travel. Provide overall SEA program expertise. Support execution of the Information Security Program (ISP) and Operations Security (OPSEC) Program. Plan, coordinate, schedule and market the SEA Program both locally and regionally to include an annual securityMore ❯
000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations. Join Accenture Federal Services, a technology company and part of global Accenture, to do work that matters in … for Sensitive Compartmented Information (SCI) activities and secure facilities. CPSO for Special Access Program (SAP) activities and secure facilities. The work : Responsible for security operations and response for offices in Northern VA. Candidate would be expected to work on site. Responsible for full-service DoD/IC support … and Industrial Security compliance for related AFS programs, customers, contracts and clients. Provide direct support for facility security, visit certifications, document control, physical security, including alarm responses. Conduct self-inspections; manage preparations for and support security inspections and audits by government securityMore ❯
Mantis Security is a leading specialty firm of high caliber talent who specialize in Cyber Operations, Cyber Defense, Information Assurance, Software Development, DevSecOps, Security Engineering, and Cloud Engineering. We enable and protect our nation's most important IT assets and invest in the long-term career … development of every employee! We are currently looking for the next Information Systems Security Engineer (ISSE) to join our team of experts! As an ISSE on the Mantis Security Team, you will define information security requirements and their integration into information systems and its … technology component through purposeful security design. What You'll Be Doing: • Develops and implements security designs ensure that the hardware, operating systems and software applications adequately address cyber security requirements and Security Controls Traceability Matrix (SCTM). • Identify points of vulnerability, non More ❯
Mayvin is currently seeking a Lead Physical Security Specialist to join the Executive Office for United States Attorneys (EOUSA) Security and Emergency Management Staff (SEMS) in Washington, DC. As the lead, you will play a crucial role in maintaining and improving the security infrastructure … of EUSAO facilities, ensuring compliance with security standards, and providing technical expertise to enhance overall security measures. This position is contingent upon contract award. Clearance Required : Top Secret Responsibilities : Provide technical support for USAOs on security systems and other physical security issues. … Diagnose issues and coordinate with the appropriate staffs (such as Information Technology (IT), Personnel Security, HSPD-12 and USAO staff) to resolve and confirm completion. Create scopes of work (SOWs) for projects and service tickets to have security vendor correct issues and restore complete operation of More ❯
FEDITC, LLC is a fast-growing business supporting DoD and other intelligence agencies worldwide. FEDITC develops mission critical national security systems throughout the world directly supporting the Warfighter, DoD Leadership, & the country. We are proud & honored to provide these services. Overview of position: FEDITC is seeking an Information … System Security Officer (ISSO) to work in Warren, MI. A United States Citizenship and an active Secret DoD SecurityClearance is required to be considered for this position. The Information System Security Officer (ISSO) serves as the principal advisor to the Information System Owner … SO), Business Process Owner, and the Chief Information Security Officer (CISO)/Information System Security Manager (ISSM) on all matters, technical and otherwise, involving the security of an information system. ISSOs are responsible for ensuring the implementation and maintenance of security controls More ❯
shows: ATS is consistently ranked as a top workplace among DC area firms and continues to grow. We are seeking an Information Systems Security Manager with a TS/SCI w/Poly to support a future contract with our Engineering Services and Solutions Division out of Annapolis … you will provide management support for a program's Information Assurance requirements. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies … standards, and procedures are established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing More ❯
Information Systems Security Engineer 3 The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system … security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/… classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the More ❯
Job Title: Special Security Officer Location: Onsite Employment Type: Full-Time, 2-Year Contract Job Summary: We are seeking an experienced Special Security Officer to oversee access control, classified materials, and compliance with security policies. The role requires expertise in security operations … personnel security, risk management, and emergency action planning. The ideal candidate will have experience with security management software and government databases and must hold an active Top Secret/SCI clearance. Key Responsibilities: Physical Security: Oversee facility access control. Manage construction security plans and compliance for renovations. Materials Control & Accountability: Handle creation, movement, and destruction of classified material and digital media. Personnel Security: Facilitate indoctrinations and debriefings. Maintain personnel security files and manage reporting requirements. Oversee incoming and outgoing external visits. Security Education & Training More ❯
Job Summary: We here at Apriva ISS is looking for an Information Systems Security Officer to support our customer located in Quantico, VA. This is a full-time, 100% on-site role, with the potential for limited travel as needed. The Information Systems Security Officer (ISSO … will be responsible for ensuring the policies for governance around security, integrity, and compliance of an Apriva ISS Customer's CSfC Gateway infrastructure, data centers, and end points are enforced. This role will assist in supporting our existing Network, Systems, and Security Engineers in the proper … maintaining & implementing security controls within a CSfC Gateway solution. This role will be customer facing and embedded within the Client's secure location, so a professional approach to communication, organizational policy, operational security, and incident response is paramount. Primary Duties/Responsibilities: • Develop, implement, and maintain More ❯
either increase efficiency, effectiveness, or innovation. Master position tasks within 60 days and exceed requirements within 90 days. Responsibilities: The Senior Information Systems Security Manager shall provide Senior onsite ISSM support for the JBSA Department of the Air Force Counter Insider Threat (DAF C IN T) programs, systems … and related interfaces. The Senior ISSM is responsible for ensuring the security and integrity of the organization's information systems, specifically in accordance with Department of Defense (DoD) and department of the Air Force cybersecurity requirements. This role involves developing, implementing, and managing security policies, procedures … Management Framework (RMF). Per section 1.3.9, Cybersecurity Support, specific responsibilities include but are not limited to: Provide professional services to address system security Governance, Documentation and Risk Management. Lead the development and enforcement of cybersecurity policies and procedures. Manage system accreditation and compliance with RMF, NIST More ❯
we do is built on a commitment to do the right thing for our customers, our people, and our community. The Leidos National Security Sector (NSS) combines technology-enabled services and mission software capabilities in the areas of cyber, logistics, security operations, and decision analytics to … to defend against evolving threats around the world. Your greatest work is ahead! The Multi-domain Solutions Division (MDS) within the Leidos National Security Sector is seeking a skilled Integration & Transition Manager to join a new cyber security program and play a key role in supporting … government-critical systems. You will be part of a program that oversees development, integration, delivery, and operations and maintenance of IT managed security services, which encompasses support to monitor the cybersecurity threat and security posture situational awareness for the enterprise. This opportunity is in anticipation of More ❯
support its PEO C3N Contract in Aberdeen, MD. The INFOSEC Engineer will provide a system-of-systems approach to advancing and synchronizing cyber security, information assurance and information management across PEO C3N. Responsibilities Provide Cybersecurity Engineering for Developmental and Systems Support:Provide systems engineering and analysis support to … the C5 community in support of cybersecurity requirements per AR 25-2 and corresponding DA PAMs ensure the security and availability of Mission Command as well as Communications systems. Provide tailored C5ISR engineering analysis concerning Cybersecurity integration at the request of Government and advise the Government of any … issues that result from this integration that present risk to achieving the goals of the digital force. Areas of focus may include communications security development and engineering support as well as programmatic and technology development for external organizations, including joint programs. Technical subject areas include encryption technologies, communications More ❯
Security Specialist Arlington VA (Rosslyn) - Fully Onsite POSITION SUMMARY We are seeking a highly skilled Security Specialist to oversee physical security and associated force protection programs at the Defense Healthcare Management Systems (DHMS) Headquarters in Rosslyn, VA. This is a fully onsite role, responsible … compliance with Department of Defense (DoD), DHA, Pentagon Force Protection Agency (PFPA), and Federal Protection Services (FPS) requirements related to Antiterrorism (AT), Physical Security, Occupant Emergency Management, and Insider Threat Programs. This position requires strong knowledge of DoD AT policy, UFC and ISC standards, and experience writing and … briefing security-related policies. The individual will also assist in facilities management duties, including space readiness, work order tracking, and suite access coordination. The ideal candidate will be detail-oriented, highly organized, and capable of providing expert-level briefings and emergency preparedness training. This is a fully on More ❯
This position is contingent on contract award Description: The Information Systems Security Engineer shall perform or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validates and verifies system … security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing protection/classification … requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security to ensure uniform application of Agency Security Policy and Enterprise Solutions. Supports the building of security architectures. Enforces the design and More ❯
Job Title: ClearedSecurity Technician Location: Nationwide Travel Pay: $20 - $35 Active Secret Clearance Required Job Responsibilities: Install and maintain electronic security systems Participate in review of design documentation and system for installation and maintenance activities Execute installation and maintenance activities within planned durations Complete More ❯
with the ability to obtain and maintain a CI polygraph Overview: The Cybersecurity Engineer with specialty focus on network packet broker provides technical security engineering delivery leadership in several network areas of expertise, such as SD-WAN, SATCOM, and 5G. The candidate will be responsible for designing and … of customer networks. The ideal candidate will collaborate with other functional and technology leaders to define and execute business priorities. Job Details: • Perform security engineering, develops security architecture artifacts, oversee penetration testing and security exercises, supports hybrid cloud and network security, and … automates security compliance for LAN/WAN solutions deployed in a hybrid cloud environment • Engineer security into LAN and WAN system design, performing internal cyber hunt activities, and tailoring Zeek-based security sensors to feed SIEM and SOAR Splunk components • Engineer securityMore ❯
Title: Cloud Security Architect Client: U.S. Army Location: Fort Belvoir, VA Responsibilities: • Responsible for guiding the design and implementation of secure solutions and services within the cloud. • Responsible for the successful configuration and implementation of cloud-based security solutions to reduce risk to an acceptable level. … Ensures that the stakeholder security requirements necessary to protect the organization's mission and business processes are adequately addressed in all aspects of enterprise architecture, including reference models, segment and cloud solution architectures, and the resulting systems supporting those missions and business processes. • Serves as a cybersecurity SME … to ensure consistent and sufficient identification and implementation of applicable cybersecurity controls in concert with the agency cybersecurity and cloud architecture and NIST security guidelines. • Provides oversight for the design and implementation of enterprise-level cybersecurity solutions providing standards for access control capabilities across the enterprise. • Develops technical More ❯
The team you'll be working with: Associate Security Consultant (Graduate) NTT DATA is one of the world's largest security service providers, partnering with top security technology brands. We're seeking passionate, curious, and motivated individuals to join our team. What you'll … be doing: Security Operations: Assist in implementing and maintaining security controls to protect information systems from unauthorized access, modification, and destruction. Incident Response: Support identification, investigation, and resolution of security incidents for timely responses. Risk Management: Participate in risk assessments and vulnerability analyses, recommending … mitigation strategies. Compliance: Ensure adherence to security policies, standards, and regulations such as GDPR, ISO 27001, etc. Documentation: Maintain accurate records of security processes, incidents, and compliance activities. Collaboration: Work with IT and other departments to ensure integrated security measures. Continuous Improvement: Stay updated More ❯
on a 6 month initial contract working hybrid, based out of their site in Warwickshire. This role requires candidates to hold an active security clearance. Experience: Implementation and Management: Oversee the implementation and management of CyberArk solutions, ensuring they meet the organization's security requirements. Technical … securityclearance in the past are most welcome to apply. Please note successful applicants will be required to be securitycleared prior to appointment which can take up to a minimum 10 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy … the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for securitycleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award More ❯