drjobs Sr. ISSO (Information Systems Security Officer) - 6835

Sr. ISSO (Information Systems Security Officer) - 6835

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Washington - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Summit Technologies Inc. is looking for a Senior Information Systems Security Officer (ISSO) to support a critical U.S. government agency in the National Capital Region. This senior-level role is responsible for ensuring the security and compliance of agency information systems by implementing and managing security controls aligned with federal cybersecurity frameworks including the NIST Risk Management Framework (RMF) FISMA and NIST SP 800-53.

This is an excellent opportunity for an experienced cybersecurity professional to contribute to the secure provisioning authorization and ongoing monitoring of systems across both on-premise and cloud environments. The contractor ISSO will collaborate with Information System Security & Privacy Officers (ISSPOs) system owners engineers and governance teams to maintain the confidentiality integrity and availability of government systems.This is a hybrid role based in Washington D.C. Candidates must be eligible for a Public Trust clearance.

Responsibilities:

  • Develop implement and maintain IT security controls in accordance with NIST SP 800-53 RMF and agency security policies.
  • Support the preparation review and submission of Security Authorization packages including the System Security Plan (SSP) Security Assessment Report (SAR) and Plan of Action and Milestones (POA&M).
  • Coordinate and prepare systems for Security Control Assessments (SCA) ensuring all artifacts are accurate and complete.
  • Conduct and document Security Impact Analyses (SIAs) for changes to hardware software cloud infrastructure or connectivity.
  • Participate in configuration and change control processes ensuring secure baselines are maintained and reflected in documentation.
  • Assist in system categorization and validate asset inventories to ensure appropriate control baselines are applied.
  • Assess control implementation effectiveness and identify deficiencies for remediation or risk acceptance.
  • Document business justifications and mitigation strategies for risk acceptance proposals for Authorizing Officials.
  • Support Continuous Monitoring by reviewing security alerts system changes and compliance evidence to ensure ongoing authorization.
  • Contribute to the development revision and enforcement of security policies procedures and technical guidelines.
  • Participate in internal IT governance processes including exception handling standards reviews and control waivers.
  • Support security awareness and training compliance for personnel with system access.
  • Monitor evolving threats and recommend adaptive security controls in response to risk landscape changes.
  • Prepare high-quality technical documentation status reports and risk briefings for internal and external stakeholders.

Requirements:

  • Bachelors degree and 9 years of IT security or systems security engineering experience or Masters degree with 7 years of experience.
  • Hands-on experience implementing and managing security controls in enterprise or federal IT environments.
  • Strong understanding of the NIST RMF NIST SP 800-53 FISMA and federal security policies including EO 14028 and OMB M-22-09.
  • Experience performing risk assessments preparing ATO documentation and tracking control deficiencies in POA&Ms.
  • Working knowledge of cloud security (AWS Azure GCP) and hybrid environments.
  • Familiarity with enterprise platforms such as Microsoft 365 Azure AD Cisco and Oracle.
  • Proficient in network and system security concepts including IDS/IPS VPNs encryption secure baselining and OS hardening.
  • Experience supporting third-party security assessments or audits.
  • Strong documentation reporting and communication skills including the ability to convey complex technical issues to non-technical audiences.
  • Proficient in Microsoft Office (Word Excel PowerPoint SharePoint).

Preferred Qualifications:

  • Current cybersecurity certification such as CISSP CISM or Security.
  • Experience with GRC and SA&A tools such as Archer eMASS CSAM or Xacta.
  • Familiarity with FedRAMP cloud compliance requirements and federal privacy regulations.
  • Knowledge of OWASP Top 10 and modern application security best practices.
  • Understanding of adversary TTPs and frameworks such as MITRE ATT&CK.
  • Ability to work independently and manage priorities in a fast-paced dynamic environment.

Clearance Requirement:

  • All candidates must be eligible to obtain and maintain a U.S. Public Trust clearance


Security Clearance:

  • Must be eligible to obtain and maintain a Public Trust clearance.

If you feel you are qualified and want to be considered for this position please supply the following to: and please put the job number 6835 in the subject line:

Summit Technologies Inc. appreciates your interest. We will contact the best matching prospects and will consider you for future opportunities. We will not submit your resume without your prior knowledge and consent. We are an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race color religion gender sexual orientation gender identity national origin disability or veteran status.


Required Experience:

Senior IC

Employment Type

Full Time

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.