Demo

Cyber ISSO/ISSE

KEMTechnology
Sterling, VA Full Time
POSTED ON 3/6/2025
AVAILABLE BEFORE 4/6/2025

THE OPPORTUNITY:

Our Federal customer with a Systems Engineering & Integration (SE&I) program focuses on providing agency with advisory and technical services with the effort of helping them support the management of their various cyber programs. Supporting activities span a wide range of topics, including requirements formation, requirements feasibility analysis, technology subject matter expertise, cyber industrial technology awareness, information assurance, independent validation, and verification (IV&V), penetration testing, prototypes, enterprise architecture, technical documentation authoring and analysis of 3rd party technical documentation, and technology roadmaps.

RESPONSIBILITIES/QUALIFICATIONS: 


This role is 40/60 split between ISSO and ISSE functionsAs an information systems security officer (ISSO), you will oversee and manage all aspects of an organization's information security system, including researching, testing, training, and implementing programs designed to safeguard sensitive information from any possible breaches.  It will also encompass:

  • Getting the system authorized for operations (ATOs)
  • Continuous monitoring of system (ConMon) where they are responsible for monitoring and tracking system vulnerabilities and compliance issues
  • Generates Plans of Action & Milestones (POA&M) to track the mitigation of vulnerabilities and compliance issues.
  • Responds to data calls, scan requests and weekly and monthly reporting
  • Generates security artifacts such as System Security Plans, Security Control Traceability Matrices, Configuration Plans and Contingency Plans and Testing, and Self-Assessment Test Plans

As an information systems security engineer (ISSE), you will safeguard networks against unauthorized modification, destruction, or disclosure.

  • Conducts risk analysis on products reviewing CVEs, plugins, CWEs etc.
  • Facilitates Technical Insertion for new products
  • Reviews Change Requests for security impacts and technical documentation from a security perspective
  • Participates in Agile Planning Events to provide technical input in addition to trade studies for tools, etc.


RESPONSIBILITIES/QUALIFICATIONS:


  • Researches, evaluates, designs, tests, recommends, communicates, and implements new security software or devices
  • Implements, enforces, communicates, and may develop internet, network, or other information security policies or security plans for data, internet, software applications, hardware, telecommunications, and computer installations
  • Manage all aspects of an organization's information security system, including researching, testing, training, and implementing programs designed to safeguard sensitive information from any possible breaches
  • Conducts risk analyses from vulnerability, compliance scans, pen testing results, or other audit activity; writes including but not limited to Plan of Action and Milestones, System Security Plans, Security Control Traceability Matrices, Configuration Management Plans, Contingency Plans and Test Results, Business Impact Analyses, and Security Impact Analyses
  • Conducts trade studies for tools and participates in Agile Planning Events to provide technical input.



REQUIREMENTS:

  • Bachelors’ Degree in Computer Information Systems with eight (8) years related experience
    OR
    12 total years of experience in Information Assurance and IT Security
  • Active TS clearance is required


PREFERRED EDUCATION/EXPERIENCE/SKILLS:

  • Experience in cloud security highly desired
  • Cyber program experience within federal customer space a plus!
  • Certifications such as CISSP, CEH, CISA, CAP highly desired


If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a Cyber ISSO/ISSE?

Sign up to receive alerts about other jobs on the Cyber ISSO/ISSE career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$163,631 - $209,073
Income Estimation: 
$192,911 - $256,346
Income Estimation: 
$99,793 - $130,112
Income Estimation: 
$125,027 - $157,872
Income Estimation: 
$125,027 - $157,872
Income Estimation: 
$149,432 - $188,965
Income Estimation: 
$149,432 - $188,965
Income Estimation: 
$179,455 - $227,077

Sign up to receive alerts about other jobs with skills like those required for the Cyber ISSO/ISSE.

Click the checkbox next to the jobs that you are interested in.

  • Disaster Recovery Planning Skill

    • Income Estimation: $112,492 - $138,850
    • Income Estimation: $128,771 - $173,153
  • Cloud Security Skill

    • Income Estimation: $125,027 - $157,872
    • Income Estimation: $149,432 - $188,965
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at KEMTechnology

KEMTechnology
Hired Organization Address Reston, VA Full Time
Opportunity Description Summary: UI Developer The User Interface Developer will be asked to continually improve user int...
KEMTechnology
Hired Organization Address Reston, VA Full Time
The Opportunity: Instructional Developer Location: Reston, VA Summary: The Instructional Developer will be responsible f...
KEMTechnology
Hired Organization Address Reston, VA Full Time
The Opportunity: Process Improvement Analyst Location: Reston, VA Position Summary: The Level 3 Process Improvement Anal...

Not the job you're looking for? Here are some other Cyber ISSO/ISSE jobs in the Sterling, VA area that may be a better fit.

AI Assistant is available now!

Feel free to start your new journey!