ISSO (TS/SCI & CIPOLY)

United StatesOnsite Columbiamid
OtherIsso
0 views0 saves0 applied

Quick Summary

Requirements Summary

Maintaining the appropriate operational security posture for an information system Manage the security of the information syste

Technical Tools
OtherIsso

Ensures the rigorous application of cybersecurity policies, principles, and

practices in the delivery of all Information Technology (IT) and cybersecurity

services. Develops and designs security solutions to maintain confidentiality,

integrity, and availability of information throughout the enterprise. Identifies,

plans, and documents improvements to security controls. Develops and

documents recommendations and courses of action (COAs) to solve complex

cybersecurity problems. Develops and interprets cybersecurity requirements

and assists in the formulation of cybersecurity/IT budgets. Plans and

schedules the installation of new or modified security hardware, operating

systems, and software applications. Ensures the assessment and

implementation of identified computer and network environment fixes as part

of the Cybersecurity Vulnerability Management program. Guides the

You will:

Maintaining the appropriate operational security posture for an

information system

Manage the security of the information system through Certification &

Accreditation (C&A)

Support the information system owner for the completion of security

related responsibilities.

Review System Security Plans (SSP) and solutions

Recommend security mechanism implementations

Evaluate and document the effectiveness of solutions implemented to

provide the "CIA Triad"

Requirements:

Minimum 5 (five) years of experience with cybersecurity or information

assurance

Minimum of Bachelor’s Degree in a technical or business discipline from

an accredited college or university in Computer Science, Cybersecurity,

Computer Engineering, or related discipline

Position Specific Requirements

 

 CAP, CASP+ CE,

CISM, CISSP (or Associate), GSLC, CCISO - (minimum DoD 8570 IAM

Level II Certification)

Must know Risk Management Framework (RMF)

Active TS/SCI + Polygraph

Preferred / Desired Skills:

Experience with DoD Cybersecurity Policies

Experience with Xacta Solutions (Xacta 360)

Knowledge of Enterprise Mission Assurance Support Service (eMASS)

Experience with Zero Trust

Exposure to AWS (Amazon Web Services), ACAS (Security scanning

software), vCenter, WSUS (Windows Server Update Service), and/or

STIGs/IAVA

A problem solver who can get in, be given a project, and use engineering

skills to determine a solution

Able to build systems from the ground up – network architecture/systems

engineering

Location: Fort Meade/Columbia, MD (Customer Site - CANX)

Listing Details

First seen
April 2, 2026
Last seen
April 26, 2026

Posting Health

Days active
23
Repost count
0
Trust Level
23%
Scored at
April 26, 2026

Signal breakdown

freshnesssource trustcontent trustemployer trust
Newsletter

Stay ahead of the market

Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.

A
B
C
D
Join 12,000+ marketers

No spam. Unsubscribe at any time.

S
ISSO (TS/SCI & CIPOLY)