drjobs Cybersecurity Analyst – ISSO Support / Threat & SOC Monitoring

Cybersecurity Analyst – ISSO Support / Threat & SOC Monitoring

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

San Miguel, NM - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

General Summary:

The Local Defender serves as a critical cybersecurity role that combines ISSO responsibilities with traditional Security Operations Center (SOC) and Threat Analyst functions. The position is pivotal in maintaining the cybersecurity posture of systems under its purview by supporting system authorization implementing cybersecurity policies and ensuring continuous monitoring in accordance with DoD Risk Management Framework (RMF). This individual will proactively manage compliance with cybersecurity directives respond to incidents and provide support to the Government customer by implementing technical and procedural safeguards based on RMF controls. The preferred candidate is an experienced ISSO with in-depth knowledge of NIST 800-53 controls RMF lifecycle steps and DoD cybersecurity policies (DoDI 8510.01 8500.01 AR 25-2). This role requires the ability to work independently support system owners and lead the documentation authorization and ongoing assessment of information systems. Requires working on-site and as needed during require CONUS and/or OCONUS travel to customer sites.

Principal Duties and Responsibilities (Essential Functions):

  • Serve as the ISSO in support of the ISO for assigned systems ensuring full compliance with RMF DoDI 8510.01 and NIST SP 800-53 security control baselines.
  • Manage and maintain all RMF-related documentation including System Security Plans (SSPs) Security Assessment Reports (SARs) Risk Assessment Reports (RARs) and Plan of Action and Milestones (POA&Ms).
  • Conduct security control assessments and facilitate ongoing authorization (ATO/ATC) activities.
  • Work directly with system owners administrators and the Government cybersecurity team to ensure all security controls are properly implemented and documented.
  • Coordinate and support all phases of the RMF lifecycle from categorization to continuous monitoring.
  • Lead vulnerability and compliance assessments using automated tools (e.g. ACAS STIG Viewer) and ensure all findings are remediated or tracked via POA&Ms.
  • Participate in Configuration Control Boards (CCBs) and validate that system changes do not negatively impact security controls or the authorization boundary.
  • Track and report on system compliance metrics ensuring timely updates to APMS and eMASS and supporting audit readiness activities.
  • Develop and deliver security awareness training user role validation and account recertification in accordance with policy.
  • Act as liaison with Authorizing Officials (AOs) Control Assessors (CAs) and NETCOM to facilitate ATO packages and compliance reviews.
  • Monitor and analyze security events from SIEM platforms firewalls IDS/IPS and EDR tools to detect threats and abnormal activity.
  • Support incident response activities and coordinate with local defender to assess impact containment and recovery actions.
  • Document all security incidents in alignment with incident handling procedures and provide after-action reports for leadership.
  • Ensure that incident findings are mapped back to RMF controls and that system documentation is updated accordingly.
  • Monitor Cyber Tasking Orders (CTOs) security bulletins CVEs and threat intelligence feeds for relevance to the operational environment.
  • Analyze potential threat vectors and adversary TTPs using frameworks such as MITRE ATT&CK and translate findings into actionable security enhancements.
  • Collaborate with stakeholders to recommend technical and policy-based countermeasures aligned with organizational risk tolerance and mission impact.
  • Prepare detailed risk assessment reports compliance dashboards and security briefings for senior leadership and stakeholders.
  • Submit timely updates and artifacts to eMASS and participate in regular cybersecurity status meetings.
  • Provide clear data-driven recommendations for improving system security postures and addressing identified risks.
  • Coordinate with mission owners and developers to implement security in system development lifecycles (SDLC).
  • Maintain awareness and proper configuration of continuous monitoring tools including SIEMs vulnerability scanners and audit logging tools.
  • Ensure tools and scripts used for compliance monitoring (e.g. RMF assessments ACAS scans) are operating effectively and producing accurate outputs.
  • Collaborate with system administrators to remediate security findings and improve hardening based on STIGs and best practices.

At COLSA people are our most valuable resource and centered at our core value. We invite you to unite your talents with opportunity and be a part of our Family of Professionals! Learn about our employee-centric culture and benefitshere.


Required Experience:

IC

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.