Demo

Information System Security Officer (ISSO) (4176) (TS/SCI) (Ft. Meade, MD)

SMX
Fort Meade, MD Full Time
POSTED ON 3/7/2025
AVAILABLE BEFORE 5/6/2025

SMX is seeking an Information System Security Officer (ISSO) responsible for monitoring and protecting information systems, networks, and organizations from unauthorized access, modification, destruction, exfiltration, or disclosure, as well as overseeing and implementing the security posture of assigned information systems in accordance with Army, DoD, and Intelligence Community (IC) policies and regulations. This role focuses on ensuring compliance with cybersecurity task orders, conducting incident response investigations, and implementing measures to protect systems against cyber threats. The ISSO assesses cybersecurity threats, conducts threat intelligence evaluations, and works with stakeholders to mitigate risks and strengthen the organization's overall security posture. The ISSO provides guidance and ensures compliance with DoD Risk Management Framework (RMF) processes and manages eMASS authorization records, validates security controls, conducts vulnerability assessments, oversees Plan of Action and Milestone (POA&M) updates, and leads continuous monitoring activities to ensure system security and authorization to operate (ATO). The ISSO supports change management process, contingency activities, and cyber inspection activities. In accordance with Army Regulation 25-2, the ISSO will assist the Information System Security Managers (ISSM) in meeting their duties and responsibilities. This is a full-time onsite position.

Essential Duties & Responsibilities

  • Account and Permissions Oversight:
    • Ensure user accounts meet all prerequisite DoD, Army, and IC requirements before being authorized for creation or renewal.
    • Perform periodic reviews of privileged groups and user accounts.
    • Analyze and monitor Role Based Access Control (RBAC) models used for systems and services.
  • Incident Response and Investigations:
    • Participate in incident response efforts, coordinate resources, and report findings to stakeholders, including incident trends, mitigation actions, and resolutions.
    • Examine audit logs, network traffic, and outputs from firewalls, intrusion detection systems, malware protection solutions, and file integrity monitoring systems to investigate security incidents, breaches, and investigations.
    • Plan, participate, and monitor incident response exercises.
  • System Monitoring, Assessment, and Compliance:
    • Carry out ISSO responsibilities as detailed in AR 25-2, DA 25-2-14, and NIST SP 800-53 security controls.
    • Perform vulnerability scans and configuration compliance scans.
    • Evaluate the results of vulnerability scans, DISA Security Technical Implementation Guides (STIGs), and DISA Security Requirements Guides (SRGs).
    • Oversee the ongoing monitoring activities of assigned systems to uphold their security posture.
    • Participate in change management processes to advise technicians and subscribers of cybersecurity requirements associated with requested changes.
    • Analyze, report, and track status of DoD, Army, and IC cybersecurity task orders within scope of system and organizational responsibilities.
  • Risk Management, Authorizations, and eMASS:
    • Collaborate with ISSM on all assessment and authorization (A&A) activities to sustain system ATOs.
    • Proactively manage eMASS system records, including updates to POA&M, hardware/software lists, tracking system authorization and POA&M expiration dates, importing of sensor data (E.g., STIGs, Vulnerability Scans), processing inheritance requests, initiation of workflows, and other related ATO record updates.
    • Validate the security controls and related artifacts in eMASS to ensure compliance with relevant DoD and IC standards
    • Collaborate with the Security Control Assessor (SCA) to evaluate and convey system risks affecting enterprise networks and mission data.
    • Ensure that security plans, controls, standards, and procedures align with cybersecurity frameworks and the evolving requirements of the DoD and IC.
    • Regularly update and improve risk models, metrics, reports, and processes to ensure compliance.
  • Vulnerability and Incident Management:
    • Generate actionable, risk-oriented reports on security assessment outcomes.
    • Help with vulnerability remediation efforts to tackle identified risks and ensure compliance.
    • Make sure that vulnerability scans and STIG checklists are updated in accordance with DA G2 policy.
  • Cybersecurity Leadership and Collaboration:
    • Offer guidance on creating and maintaining Standard Operating Procedures (SOPs), Tactics, Techniques, and Procedures (TTPs), and other documentation.
    • Collaborate with system administrators, government customers, and security teams to address risks and rectify deficiencies.
    • Keep thorough and current records of system status and deliver regular reports to government leaders.
    • Coordinate overall system authorization schedules with system stakeholders.
  • Policy Development and Communication:
    • Develop and uphold cybersecurity policies, standards, and testing plans.
    • Ensure that the user community follows procedures to maintain the security posture of information systems.
    • Effectively communicate security risks and findings to stakeholders through written status reports, peer reviews, and meetings.
  • Threat Research and Mitigation:
    • Research and report on new threats, attack vectors, and exploitation methods, demonstrating a thorough understanding of cyber threat actor tactics, techniques, and procedures (TTPs).
    • Assess, plan, and improve cybersecurity architecture, detection signatures, and tool configurations to protect systems from breaches.
    • Perform cyber threat intelligence analysis, correlate actionable cybersecurity events, and create correlation techniques for identifying threats.
  • Automation and Process Optimization:
    • Identify and evaluate solutions for automating cybersecurity analysis tasks to enhance efficiency and accuracy.

Required Skills, Experience & Education

  • Bachelor's degree in a STEM field: Science, Technology, Engineering, or Mathematics.
  • Active Top Secret (TS) security clearance with eligibility for SCI and NATO read-on before commencing work.
  • DoD and Cybersecurity Requirements: CGRC/CAP or CASP or CCSP or Cloud or SSCP or Security or GSEC
  • A minimum of five years of experience in assessment and accreditation activities for national security systems (NSS).
  • Five years of experience validating system security controls.
  • Five years of experience in vulnerability management.
  • Five years of experience with DISA STIGs, SRGs, and vendor-specific security guides.
  • Four years of experience implementing RMF processes and utilizing eMASS.
  • Two years of experience managing POA&M updates and resolutions.
  • One year of experience conducting continuous monitoring of system security controls.
  • Technical Proficiency: In-depth understanding of RMF, eMASS, DISA STIGs, SRGs, and vulnerability management tools.
  • Risk Management: Advanced ability to assess, prioritize, and mitigate risks to national security systems and enterprise networks.
  • Analytical Thinking: Strong analytical skills to assess system risks, interpret vulnerability scans, and create actionable recommendations.
  • Leadership: Ability to lead and mentor cybersecurity teams and oversee professional development.
  • Policy Development and Communication: Skilled in creating and maintaining cybersecurity policies and effectively communicating with technical and non-technical stakeholders.
  • Problem-Solving: Capable of identifying, tracking, and resolving complex system vulnerabilities and security control issues.
  • Attention to Detail: Thorough in maintaining records, validating security controls, and preparing compliance documentation.
  • Collaboration: Skilled at working with system administrators, SCAs, and Government leads to meet security objectives.
  • Adaptability: Keeps up with evolving cybersecurity standards, threats, and DoD/IC requirements to enhance security processes.

Desired Skills/Experience

  • Five years of experience as an ISSO supporting Army intelligence programs.
  • One year of experience in AC2SP tenant assessment and accreditation activities.
  • Experience managing multiple complex systems in Army and DoD environments.
  • Experience automating manual processes.

Application Deadline: April 14, 2025

#CJPOST

#LI-onsite


At SMX®, we are a team of technical and domain experts dedicated to enabling your mission. From priority national security initiatives for the DoD to highly assured and compliant solutions for healthcare, we understand that digital transformation is key to your future success.

We share your vision for the future and strive to accelerate your impact on the world. We bring both cutting edge technology and an expansive view of what's possible to every engagement. Our delivery model and unique approaches harness our deep technical and domain knowledge, providing forward-looking insights and practical solutions to power secure mission acceleration.


All qualified candidates will receive consideration for employment without regard to disability status, protected veteran status, race, color, age, religion, national origin, citizenship, marital status, sex, sexual orientation, gender identity or expression, pregnancy or genetic information.

Selected applicant may be subject to a background investigation and/or education verification.

If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a Information System Security Officer (ISSO) (4176) (TS/SCI) (Ft. Meade, MD)?

Sign up to receive alerts about other jobs on the Information System Security Officer (ISSO) (4176) (TS/SCI) (Ft. Meade, MD) career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$87,093 - $107,335
Income Estimation: 
$111,725 - $147,313
Income Estimation: 
$112,673 - $137,290
Income Estimation: 
$140,233 - $181,029
Income Estimation: 
$161,209 - $233,553
Income Estimation: 
$87,093 - $107,335
Income Estimation: 
$111,725 - $147,313
Income Estimation: 
$112,673 - $137,290
Income Estimation: 
$140,233 - $181,029
Income Estimation: 
$161,209 - $233,553
Income Estimation: 
$112,673 - $137,290
Income Estimation: 
$139,945 - $168,577
Income Estimation: 
$140,233 - $181,029
Income Estimation: 
$161,209 - $233,553
Income Estimation: 
$152,549 - $188,894
Income Estimation: 
$194,072 - $240,547
Income Estimation: 
$135,994 - $168,063
Income Estimation: 
$161,209 - $233,553
Income Estimation: 
$70,462 - $84,818
Income Estimation: 
$77,991 - $108,747
Income Estimation: 
$87,093 - $107,335
Income Estimation: 
$140,233 - $181,029
Income Estimation: 
$161,209 - $233,553
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at SMX

SMX
Hired Organization Address Lexington, MD Full Time
SMX is looking for a highly motivated Technical Project Manager with a software engineering background to support the Ac...
SMX
Hired Organization Address Boulder, CO Full Time
Outside Analytics has recently become a proud subsidiary of SMX, marking an exciting collaboration that enhances our col...
SMX
Hired Organization Address Fort Belvoir, VA Full Time
SMX is seeking a Vulnerability Analyst to perform regular vulnerability assessments and scans of networks, systems, and ...
SMX
Hired Organization Address Fort Belvoir, VA Full Time
SMX is seeking a Data Analyst to design, develop, and implement data-driven solutions to enhance cybersecurity operation...

Not the job you're looking for? Here are some other Information System Security Officer (ISSO) (4176) (TS/SCI) (Ft. Meade, MD) jobs in the Fort Meade, MD area that may be a better fit.

Chief information security officer

US Office of the Chief Information Officer, Salt Lake, UT

Information System Security Officer 3

iNovex Information Systems, Columbia, MD

AI Assistant is available now!

Feel free to start your new journey!