Information Systems SecurityOfficer Aberdeen Proving Ground, MD - 100% On-Site The Job Our client's team members are subject matter experts in both cybersecurity and US Government policy. Our client is excited about generating creative solutions to ambiguous security requirements. Their mission is deploying software in support of their customers' most critical needs as quickly as … Authorization to Operate (ATO) process. They're seeking dedicated and motivated individuals with Systems Administration, Software Development, or Systems Engineering backgrounds to join our team as an Information System SecurityOfficer (ISSO). You will collaborate with other engineers to ensure security policies and settings are in place, build standardized security documentation, and generate evidence of … compliance once settings have been applied. Functions • Achieve ATOs for our client's software across multiple government customers with minimal oversight. • Partner with engineers to analyze software, interpret security requirements, and plan effective control implementations. • Provide outstanding customer service, policy expertise, and high-quality documentation. • Serve as the primary in-person point of contact for one or more U.S. More ❯
BlueHalo, an AV company, is seeking a highly motivated and experienced Information Systems SecurityOfficer (ISSO) to play a critical role in achieving and maintaining Authorization to Operate (ATO) for information systems. The ISSO candidate will be responsible for evaluating the security posture of assigned systems throughout their lifecycle, ensuring compliance with federal security regulations and … frameworks, primarily the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). This role requires a deep understanding of the ATO process, strong technical security skills, and excellent communication abilities to collaborate with various stakeholders. This position could support multiple projects, primarily government programs with some support of commercial programs. The candidate will work on a … team comprised of AV, sub-contractors, associate contractors, and end-customer personnel. Responsibilities and Typical Duties: Support the development, review, and maintenance of comprehensive ATO documentation (e.g., System Security Plan (SSP), Contingency Plan (CP), Privacy Impact Assessment (PIA), Risk Assessment Report (RAR), Plan of Action & Milestones (POA&M . Ensure all documentation adheres to relevant security policies and More ❯
Overview We're seeking an experienced Information System SecurityOfficer (ISSO) for a hybrid role (2-3 days/week) onsite. You'll collaborate with Government stakeholders, engineers, and developers to assess cyber risks, enforce security policies, and implement mitigation strategies. This role supports secure operations across cloud infrastructure, AI/ML solutions, CI/CD pipelines … management frameworks using NIST standards (e.g., SP 800-30, 800-53, 800-128, 800-160, 800-171) and CIS benchmarks. 3+ years supporting cybersecurity operations as an Information System SecurityOfficer (ISSO) or similar role. Experience applying security controls aligned with RMF, FedRAMP, ICD 503, and DoD Information Levels. Hands-on experience with AWS cloud environments, containerized … implementing mitigations, and reviewing audit logs for anomalies. Familiarity with continuous monitoring practices and tools. Security+ or higher certification. High School diploma or GED. Key Responsibilities Implement and maintain security controls across cloud and on-prem environments. Support system authorization efforts, including package development and submission. Interface with internal and external cybersecurity stakeholders, including PMs, AOs, and Cyber Assessors. More ❯
Position Overview: We are seeking an Information Systems SecurityOfficer (ISSO) to support cybersecurity and information assurance activities at Eglin AFB. The ideal candidate will help ensure the confidentiality, integrity, and availability of mission-critical systems by implementing and managing security controls in compliance with Department of Defense (DoD) cybersecurity policies and standards. Key Responsibilities: Develop, implement … and maintain security documentation, including System Security Plans (SSPs), Plan of Action & Milestones (POA&Ms), and risk assessments. Support system accreditation and continuous monitoring activities under the Risk Management Framework (RMF). Conduct vulnerability assessments, track remediation efforts, and verify that security requirements are effectively implemented. Monitor system compliance with DoD, NIST, and organizational security policies. … Participate in security audits, inspections, and assessments. Collaborate with system administrators, engineers, and program teams to ensure secure system design and operations. Support incident response by documenting and coordinating response actions. Provide recommendations to improve system security posture and support security awareness initiatives. Required Qualifications: Active Secret clearance (or higher). Current CompTIA Security+ certification (IAT Level More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
One of Reed Technology’s best MSPs clients has a requirement for a CISO to come on board and deliver strategic security leadership, regulatory guidance, and cyber risk oversight to financial services clients. Further details as follows: Role: Chief Information SecurityOfficer (CISO) Day rate: Competitive OUTSIDE IR35 Time commitment: Expected time commitment – 2-3 days per … days depending on client engagement Start date: ASAP (Targeting mid-June) Location: Remote About the Role We are seeking a highly experienced and strategic Contract vCISO to provide expert security leadership to our financial services clients. This role is ideal for a senior security professional who thrives in a client-facing, advisory capacity and is passionate about helping … organisations meet regulatory expectations and strengthen their cyber resilience. As a vCISO, you will act as an outsourced Chief Information SecurityOfficer, delivering tailored security advice, overseeing cyber risk management, and supporting clients through regulatory and audit readiness processes (e.g., ISO 27001, SOC 2). You will also play a key role in shaping and expanding our More ❯
Position: Systems Administrator/Information Systems SecurityOfficer (ISSO) Massa Products Corporation seeks a Systems Administrator (SysAd) and Information Systems SecurityOfficer (ISSO) to help build and maintain our IT computing and network infrastructure, as well as ensure Information Assurance (IA) compliance in both unclassified and classified environments. Additionally, the successful candidate will provide end-user … employees and third-party vendors on IT and cybersecurity projects. o Develop and administer instructions and/or conduct training for system users on operating systems, relational databases, cyber security requirements, and other applications. o Maintain confidentiality, availability, and integrity regarding the information being processed, stored, or accessed on the network o Assists in maintaining backup/restore and … disaster recovery preparedness. o Maintain accurate and up-to-date software and hardware inventory listing. o Align information technology (IT) priorities with the security strategy. o Provide occasional off-hours support during outages, system upgrades, or other critical, time-sensitive events. Requirements and Education: Required Qualifications: • Bachelor's Degree from an accredited college or university in computer science or More ❯
for electrifying their homes, shifting usage to off-peak hours, and supporting grid stability-critical for scaling AI and energy-intensive industries. We're looking for a Chief Information SecurityOfficer (CISO) to lead our company-wide security strategy. You'll protect our infrastructure, digital assets, and customer data while enabling fast, secure growth. Key Responsibilities Security Strategy & Leadership Define and lead Fuse's security strategy across infrastructure, applications, and data. Lead hands-on development of security roadmaps, maturity models, and control frameworks tailored to Fuse's risk profile. Directly contribute to architecture reviews, threat modelling sessions, and key design decisions across product and platform teams. Build and mentor a high-performing security team, including hiring, coaching, and managing performance. Develop KPIs and reporting structures to measure and communicate security posture to leadership and the board. Advise the executive team on security risks, regulatory exposure, and investment priorities to support long-term growth. Governance & Compliance Own company-wide security governance, including data protection, access control, and insider risk. Ensure More ❯
Looking for a new challenge? Take a look at our current vacancies. If you see a vacancy that is right for you, we encourage you to apply! Chief Information SecurityOfficer We currently have an exciting opportunity for an experienced Chief Information Security Officer. If you are keen to maintain and develop an environment and culture for … our organisation that ensures and assures the security of our information and technology then we would really like to hear from you. Employment Type: Full-time Working hours: 35 hours per week. Where possible, we are open to considering part time/flexible working patterns. Please let us know in your application your desired working pattern Reporting to: CTO … and the ever-changing technology landscape, it is a very exciting time to be joining the Technology team here at the Financial Ombudsman Service. As our Chief Information SecurityOfficer (CISO), you will maintain and develop an environment and culture for our organisation that ensures and assures the security of our information and technology. Given the nature More ❯
provide the best possible person-centred care to elderly and vulnerable people, and we're continually growing and improving our services. We have a rare opportunity for an IT SecurityOfficer to join us on a permanent basis. This is a vital position, which will ensure the information security of residents and colleagues across more than … care homes and hospitals across the UK. As the Information SecurityOfficer, you will help develop and maintain cybersecurity and privacy policies, while actively contributing to various team projects. Requirements: Experience in Information Security with a focus on governance, risk, and compliance Have knowledge of IT systems, networking principles, and security controls Good attention to detail … and prioritises daily tasks independently Role and responsibilities: Help maintain and align cybersecurity and privacy strategy with business and regulatory needs Conduct risk, vulnerability, and penetration testing to address security gaps Help develop and maintain cybersecurity policies and standards Stay updated on cyber threats and enhance overall security posture Assist in managing security incidents and ensure prompt More ❯
creating safe working environments and fostering career development. We serve various sectors, including shopping centers, commercial locations, and airports, ensuring that our clients' unique needs are met. As a SecurityOfficer at ABM UK, you will play a vital role in maintaining the safety and security of our clients' premises. You will be responsible for monitoring access … points, conducting patrols, and responding to potential security threats. Our goal is to provide top-notch security services while delivering exceptional customer service to our clients. MAIN DUTIES & RESPONSIBILITIES: Responsibilities Conduct regular patrols of the premises to ensure the safety and security of personnel, property, and assets Monitor and screen visitors, ensuring proper identification and granting access … as per company protocols Respond promptly to all security incidents, including alarms, disturbances, and emergencies, and take appropriate action Enforce company policies and regulations to maintain a safe and secure environment Conduct thorough investigations of any security incidents and provide written reports Collaborate with law enforcement agencies and emergency services when necessary Maintain accurate records of all securityMore ❯
and the world are counting on us to deliver. Join the transformation and help us make this impact now. BlueHalo, an AV Company, is seeking a strong Information System SecurityOfficer to join the team and provide aid to the program, organization, system, or enclave's information assurance program. In this position the individual will lend assistance for … proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies If that sounds like you and you're ready to make an impact now, not later, read on for the details and apply to make the most out of your career. You'd like to do this Assist security authorization activities in compliance with Information System … Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Maintain operational security posture for an information system or More ❯
Summary The Senior Information System SecurityOfficer (Sr. ISSO) will assist in preparation, development, and maintenance of specialized Information Systems (IS) security plans used to obtain/retain DCSA accreditation. Essential Duties and Responsibilities may include the following. Other duties may be assigned. Review and revise IS system plans documentation based on analysis of the existing equipment … configuration. Document any changes or special security requirements. Provide day-to-day technical support to classified IS including adherence to policies, procedures, and best practices. You will be required to oversee the system compliance, and auditing of the information systems. Oversees the information systems readying system configurations for ISSM certification and/or DCSA accreditation/assessment. Assist with … the design, develop, and implement annual IS security training for the end-users. Similar but specialized training will also be given to the Data Transfer Agents DTAs and SAs annually. Assists the SAs in the implementation and validation of security relevant controls on computing systems; network devices such as switches, routers and firewalls; SAN storage; and virtualization hosts More ❯
Clarksburg, West Virginia, United States Hybrid / WFH Options
Edgewater Federal Solutions, Inc
Edgewater Federal Solutions is seeking a Senior Information System SecurityOfficer (ISSO) to provide overall compliance of the security posture for our federal client. The ISSO will support the establishment, implementation, and maintenance of a life-cycle security model that develops, maintains, and dispositions information systems, services and data, and safeguards their confidentiality, integrity, and availability. … Expertise in NIST compliance, Open Web Application Security Project (OWASP), Common Criteria, DISA and SANS institute. The position requires an active Top Secret Clearance and hybrid work environment (2-3 days onsite per week) performed in Clarksburg, West Virginia. RESPONSIBILITIES: • Coordinate with system owners to ensure systems are operated and maintained in accordance with security policies and practices. … Reports all information system security incidents through the appropriate channels. • Creates security practices, including National Institute for Standards and Technology (NIST), Open Web Application Security Project (OWASP), Common Criteria, Defense Information Security Agency (DISA) and SANS Institute. • Experience working in Scaled Agile Framework (SAFe) development environments. • Demonstrated level of experience in information security practices within More ❯
The Information Systems Security Engineer II Hanover, MD TS/SCI Full Scope Polygraph (On site, 40 hrs.' per month remote) The Information Systems Security Engineer II (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. … Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational … environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. Supports the building of security architecture. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the More ❯
Job Number: 72 Job Category: GovTech Job Title: INFORMATION SYSTEMS SECURITYOFFICER - FLORIDA - URGENT Job Type: Full-time Clearance Level: Top secret/SCI Work Arrangement: On-site Job Location: FL Tyndall AFB Salary: 100k - 150k Background Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information Ensure appropriate security controls … are in place that will safeguard digital files and vital electronic infrastructure Respond to computer security breaches and viruses Implement information system security requirements, system security plans, assist with the development of ATO packages and ensure all auditing requirements are completed Ensure all system security procedures are followed including updates to system security software patches … to antivirus definition files, and ensuring audit files are maintained and reviewed Interface regularly to address any issues and ensure compliance with all pertinent regulations related to information system security Provide IAO/ISSM functions necessary to maintain mission effectiveness Requirements BS degree 5-9 years of experience Experience assisting in the development of ATO packages Experience as a More ❯
Information Assurance, IAVA, System Security Plans (SSPs), RMF, Windows, Linux, Authorization to Operate, Verification and Validation, Security+, Security X, CASP+, NIST 800-53 Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI … Polygraph must be within the last five (05) years). At least twelve (12) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, Information Security, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar processes may be substituted for … a bachelor's degree. Security+ Certification or Security X (previously known as the CASP+) Certification required Must have experience as ISSO working independently, and/or on teams maintaining secure information system operations in isolated, connected and standalone environments. Must have at least five (05) years of experience using tools to support IAVA management. Must have at least five More ❯
The main office is based near Liverpool Street station, London. We have offices in Bermuda, Brazil, Cyprus, Greece, Hong Kong, Japan, and Singapore. Overall Job Purpose : The Junior Information SecurityOfficer (JISO) will assist the Information Security team in implementing and maintaining the information security management system with the objective of managing risks to information assets … to an acceptable level. The JISO will develop a good understanding of the information security policies, standards and procedures and will assist InfoSec in implementing, managing and monitoring the relevant controls. It is imperative that the JISO develops a strong understanding of the organisation's technology landscape to help identify potential threats and vulnerabilities. Key Responsibilities: Assist in maintaining … the information security standards, procedures and guidelines. Participate in the information security risk management process to identify, assess, treat and monitor risks. Manage information security incidents and events to protect information assets. Help develop and implement incident response plans and procedures to ensure that information services are recovered in a timely manner in the event of a More ❯
Agile is seeking an Information Systems SecurityOfficer -, responsibilities include the following: Active TS/SCI clearance is required: Certification Requirements: CISM and one of the Following: (CGRC), Certified in Risk and Information Systems Control (CRISC), Information Systems Security Management Professional (ISSMP), Certified Information Systems Auditor (CISA), Certified Cloud Security Professional (CCSP), Certified Ethical Hacker (CEH … principal advisor to the Authorizing Official (AO) and System/Service Owner (SO) on all matters involving information system security. Develop, implement, assess, and maintain system-level information system security controls in accordance with Department of Justice, NIST 800-53, and other federal regulations. Support data calls, audits, system security assessments & authorizations, continuous monitoring, and ongoing authorizations. Work … with the System Owner to categorize the information system, identify the appropriate control baseline, and assess correlating security controls. Create, capture, and maintain artifacts and documented processes to support control assessment results Qualifications: Minimum of 2 years of hands-on experience and knowledge in the Risk Management Framework (RMF) and NIST publications. Experience in developing, maintaining, assessing, and performing More ❯
This is a contingent opportunity The ISSO is responsible for the administration and management of the Information Security program for Headquarters United States Space Force (HQ USSF) Staff Security Office. Duties: Provide Information Systems SecurityOfficer duties for USSF, to include coordination of software and hardware change/problem resolution, account access, data transfers, scanning, and … copying data to/from external media; Attend required technical and security training (e.g. Operating system, networking, security management) relative to assigned duties; Maintain compliance for designated HQSF locations throughout HQSF Area of Responsibility (AOR) IAW AF, DoD and IC guidance; Conduct annual Cyber Assurance self-assessments and program reviews for all assigned SCI and/or SAP … years experience in cybersecurity and Network Infrastructure Working knowledge if Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include Communication Security (COMSEC) integration Working-level knowledge of applicable security policy manuals, DCIDs, JAFANs, and other policy documents. Certification: Security+ is required Clearance: Active TS/SCI clearance Benefits : K2 Group's More ❯
Information Systems SecurityOfficer (ISSO) Mid-Senior Level $90,000 - $140,000 Colorado Springs, CO TS/SCI Clearance Required Protect critical systems. Power national defense. Your cybersecurity leadership starts here. A Day in the Life - What You'll Do • Maintain and enhance the security posture of classified information systems within DoD environments. • Collaborate with the ISSM … and ISO to manage day-to-day cybersecurity operations, vulnerability mitigation, and RMF compliance. • Coordinate and document system security changes, continuous monitoring efforts, and configuration management activities. • Conduct audit reviews, security assessments, and generate compliance reports for internal stakeholders and external government agencies. Is This You? • 5-15 years of experience in cybersecurity or information assurance roles supporting … defense or government systems. • Bachelor's degree in STEM (Science, Technology, Engineering, or Mathematics). • Active Top Secret/SCI clearance is required. • Detail-oriented, security-focused, and confident interfacing with both technical teams and senior leadership. • Skilled in implementing and managing Risk Management Framework (RMF) processes and conducting security impact analysis. Core Skills & Tools Cybersecurity & Compliance • NIST More ❯
Maintain the appropriate operational security posture for assigned systems, programs, and/or enclaves. • Provide guidance and technical expertise on all matters that impact or effect the security of the information system. • Assist in the development and execution of an enterprise level continuous monitoring program to minimize security risks and ensure compliance with that program on a … routine basis. • Developing, updating, and submitting the System Security Plan and other required documentation that make up the Security Authorization Package. • Conduct configuration management for security-relevant changes to software, hardware, and firmware. • Perform and deliver security impact analyses of changes to the system or its environment of operation. • Assess the effectiveness of system security controls on an ongoing basis to determine system security status. • Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments. • Provides configuration management for security-relevant information system software, hardware, and firmware. " Education and Experience: • 10 years of related work experience in the field of security authorization. • A Bachelor More ❯
Relief Protective SecurityOfficer- PSO (Federal Contract) Part time - 22.5 Hours per week(4.5hrs/day) One opening in the following areas: Carroll, IA; Burlington, IA; Coralville, IA; Mason City, IA; Sioux City, IA; Spencer, IA Responsibilities As a security contractor for the Federal Protective Service, you will be assigned to work in various federally owned and … control access to specific areas of a facility. enforce property rules and regulations. detect and report criminal acts. stop and if possible, detain persons engaging in criminal activities. provide security against loss from fire or mechanical equipment failure. respond to emergency situations involving the safety and security of the facility. deny and prevent entry to those persons refusing … have verifiable documentation of at least one experience level and at least one educational level or any reasonable combination listed below: Experience • A minimum of two (2) years of security (armed) or law enforcement experience; or • A minimum of two (2) years of honorable service as a member of any U.S. Armed Forces component Must be able to demonstrate More ❯
A leading federal contractor is seeking a qualified and motivated Cybersecurity Information System SecurityOfficer (ISSO) Level 3 to support a mission-critical Department of Defense (DoD) program. This role offers the opportunity to join a team of professionals committed to cybersecurity excellence and national defense. As an ISSO, you will apply and manage IT security controls … lifecycle-including assessment, authorization, sustainment, and system disposition. You'll collaborate with Certified Defense Contractors to uphold continuous monitoring standards and meet change management requirements. Close coordination with the Security Control Assessor (SCA) and Authorizing Official Designated Representative (AODR) is essential to obtain and maintain security approvals. Additional duties include account management, auditing, vulnerability scanning, and advising both … ME in Computer Science, Cybersecurity, MIS, or related field Relevant certifications or equivalent experience may be considered in lieu of a degree 1+ year of experience implementing RMF IT security controls and policies DoD 8140/DoD 8570 IASAE Level II certification Security Professional Education Development (SPēD) certification More ❯
training in a computer-related field plus 10 years of relevant experience, OR +High School diploma/GED plus 12 years of relevant experience. Degree in Information Assurance, Information Security, Information Systems, Information Technology, Computer Networking, Information Science, Cyber Security, or related is preferred. Relevant experience must be in information systems design, development, programming, information/computer/… cyber/network security, vulnerability analysis, system auditing, penetration testing, computer forensics, computer systems research, and/or systems engineering (i.e., requirements analysis, design, implementation, testing, integration, deployment/installation, and maintenance). Experience in the Risk Management Framework (RMF), Information Systems Security technologies, IT policies, and ability to interpret policies and directives is desired. Network and system … of assignment to the position. Maintaining certification status is required through continuous education training or sustainment training while serving in this work role. General LCAT Description: The Information System SecurityOfficer (ISSO) is responsible for ensuring the appropriate operational security posture is maintained for an information system (IS). ISSO responsibilities support the Secure the Enterprise (STE More ❯
Seeking Information System SecurityOfficer candidates for contingent prime award expected June 1, 2025. Must have 8+ years experience with a Bachelor's in a STEM field or 12+ years experience without a degree. Must also have an IAM Level I certifications which can include any one of the following: - CAP - CND - Cloud+ - GSLC - Security+ CE More ❯