Data Security Analyst - Junior Level
Washington, DC
Job Title: Security Data Analyst - Junior Level
Duration: Long-term (24+ Months)
Scope:
Provide an entry-level Safety & Security Data Analyst to support the OIA's data collection and reporting needs.
Responsibilities Include:
Gathering and organizing safety and security data from multiple sources.
Maintaining accurate records and ensuring data integrity.
Performing basic data analysis using Microsoft Excel (pivot tables, charts, formulas).
Creating simple reports, charts, and summaries to support decision-making.
Collaborating with internal teams to collect and validate data.
Minimum Qualifications:
Strong proficiency in Microsoft Excel.
Experience with data collection and basic reporting.
Attention to detail and ability to maintain accurate records.
Good communication skills and ability to work in a team environment.
Ability to maintain confidentiality and protect the integrity of sensitive and proprietary data.
Preferred Qualifications:
Familiarity with basic data visualization techniques.
Familiarity with Python and SQL is a plus.
Familiarity with Microsoft PowerBI and DAX queries is a plus.
Exposure to safety, security, or transportation-related data is a plus.
Junior Defensive Cyber Analyst | Yokosuka, Japan
Arlington, VA
Our Deloitte AI & Engineering team to transform technology platforms, drive innovation, and help make a significant impact on our clients' success. You'll work alongside talented professionals reimagining and reengineering operations and processes that are critical to businesses. Your contributions can help clients improve financial performance, accelerate new digital ventures, and fuel growth through innovation.
Work You'll Do
The Cyber Analyst team member is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industrial Control Systems (ICS) as well as on-premises and cloud enterprise networks. This includes analysis of device communication, forensic analysis of Windows or Linux systems and servers, timeline analysis of activity on these endpoints, user permission and authentication audits, log analysis, and malware identification/triage.
An ideal candidate for this position will be a proactive self-starter who has experience with system administration, Windows and Linux operating systems (OS) mechanics including filesystem structures, disk and memory forensics, cyber aware Operational Technology or Control Systems operators, commonly used mechanisms for maintaining security persistence, privilege escalation, and lateral data movement, operating system log analysis, and triaging suspicious file artifacts for unusual behavior. This role requires a familiarity with what routine OS activities and common software/user behavior looks like in the context of forensic artifacts or timelines. Analysts should also be familiar with common categories and formats of host-based indicators of compromise (IOCs) and how/where they can be leveraged to identify known-bad files/activity on an endpoint. Candidate will utilize the Cyber Kill Chain and synthesize the entire attack life cycle along with creating detailed reports on how impacts may or have occurred.
* Support SOC team in operating and performing duties in a Security Operations Center (SOC) to provide a secure environment that facilitates monitoring, incident response, malware analysis, and threat hunting activities.
* Develop and utilize analytics on the security information and event management (SIEM) platform to monitor for security alerts and coordinate vulnerability assessments and artifact collection across servers and network devices.
* Asses Security Technical Implementation Guides (STIGs) compliance and completion.
* Utilize asset mapping tools to verify connected inventory.
* Handle Information Assurance Vulnerability Management (IVAM) notifications.
* Evaluate network structures and device configurations for security risks, offering recommendations based on best practices, and gather data to identify and respond to network intrusions.
* Analyze network traffic and system logs to identify malicious activities, vulnerabilities exploited, and methods used, and develop processes to enhance SOC response and efficiency.
* Conduct comprehensive technical analyses of computer evidence, research and integrate new security tools into the SOC, and synthesize findings into reports for both technical and non-technical audiences.
The Team
Deloitte's Government and Public Services (GPS) practice - our people, ideas, technology and outcomes-is designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
Our Hybrid Cloud Infrastructure offering provides specialized engineering capabilities to design, implement, manage, and operate hybrid cloud environments, modernize networks and AI infrastructure from the core to the edge, and incubate new infrastructure and device services to help clients stay ahead with the latest technology advances.
Qualifications
Required:
* Active Secret Clearance
* Bachelor's degree in IT/Cybersecurity related field
* 1+ years of experience in security operations
* Demonstrated experience with analytical duties and performing host or network security analysis
* Proficient in analyzing cyber-attacks, with a deep understanding of attack classifications, stages, and system/application vulnerabilities
* Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center.
* Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE ATT&CK framework, with the ability to collaborate effectively across multiple locations.
* Ability to be onsite 100% of the time in Yokosuka, Japan
* Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.
Preferred (Desired):
* Active Top Secret Clearance
* Knowledge of Operational Technology (OT) or Industrial Control Systems (ICS)
* Strong analytical and troubleshooting skills
* Able to provide expert content development in Splunk Enterprise Security using tstats and data models
* Understands how to utilize knowledge of latest threats and attack vectors to develop correlation rules for continuous monitoring
Information for applicants with a need for accommodation: [1] ************************************************************************************************************
Recruiting tips
From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits
At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture
Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work.
Our purpose
Deloitte's purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Learn more.
Professional development
From entry-level employees to senior leaders, we believe there's always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte Consulting LLP, a subsidiary of Deloitte LLP. Please see ********************************* for a detailed description of the legal structure of Deloitte LLP and its subsidiaries.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Requisition code: 318597
Job ID 318597
Information Systems Security Manager
Chantilly, VA
Key Role:
Serve as a Lead Information Systems Security Manager (ISSM) responsible for the Risk Management Framework (RMF) authorization of assigned Information Systems (IS). Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security plan. Conduct periodic assessments of authorized systems and ensure corrective actions for all identified findings and vulnerabilities are addressed in a timely manner. Assume responsibility for all RMF continuous monitoring activities for authorized systems, including periodic analysis of collected audit records and the system vulnerability management cycle. Monitor system incident recovery processes to ensure security features and procedures are properly restored and functioning correctly. Ensure user activity monitoring data is analyzed, stored, and protected in accordance with our program policies and procedures, and execute a strong continuous monitoring strategy.
Basic Qualifications:
Experience with NIST 800-53, ICD 503, and RMF practices, Security Technical Implementation Guides (STIGs), computer networking, and an operating system
Experience with the development of Assessment and Authorization (A&A) artifacts
Experience assessing and documenting test or analysis data to show cybersecurity compliance and setting up auditing dashboards, and reviewing results in SPLUNK
Experience conducting risk analysis, reviewing ACAS, CVEs, plugins, CWEs, research, collaborating with System Administrators to mitigate identified vulnerabilities or author Plans of Action and Milestones (PO&AM)
Knowledge of National Industrial Security Program Operating Manual (NISPOM), Joint Special Access Program Implementation Guide (JSIG), Intelligence Community Directives (ICD) 503 and 703, the RMF process, and associated National Institute of Standards and Technology (NIST) publications
Knowledge of DD 254 requirements from an information security perspective
Ability to configure and run security scans with Tenable products
TS/SCI clearance with a polygraph
HS diploma or GED
IAM Level III Certification, including CISSP, GSLC, or CISM Certification
Additional Qualifications:
Experience as an ISSO, ISSM, Information Systems Security Engineer (ISSE), or Security Controls Assessor supporting classified programs
Ability to operate independently without supervision
Ability to identify, contain, investigate, and report data spills through preliminary written reports
Ability to coordinate the containment and device sanitization with staff at the affected locations
Ability to provide an assessment and mitigation strategy addressing the data spill in the approved response plan
Possession of excellent organizational skills
Possession of excellent verbal and written communication skills
Bachelor's degree
CCNA, Red Hat, or Windows Certification
Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance with polygraph is required.
Compensation
At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen's benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page.
Salary at Booz Allen is determined by various factors, including but not limited to location, the individual's particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $77,600.00 to $176,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen's total compensation package for employees. This posting will close within 90 days from the Posting Date.
Identity Statement
As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud.
Work Model
Our people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely.
If this position is listed as remote or hybrid, you'll periodically work from a Booz Allen or client site facility.
If this position is listed as onsite, you'll work with colleagues and clients in person, as needed for the specific role.
Commitment to Non-Discrimination
All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.
Auto-ApplyInformation System Security Officer - Intermediate
Chantilly, VA
Title:
Information System Security Officer - Intermediate
Belong. Connect. Grow. with KBR!
KBR's National Security Solutions team provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security communities. In this position, your work will have a profound impact on the country's most critical role - protecting our national security.
Why Join Us?
Innovative Projects: KBR's work is at the forefront of engineering, logistics, operations, science, program management, mission IT and cybersecurity solutions.
Collaborative Environment: Be part of a dynamic team that thrives on collaboration and innovation, fostering a supportive and intellectually stimulating workplace.
Impactful Work: Your contributions will be pivotal in designing and optimizing defense systems that ensure national security and shape the future of space defense
This is a contingent position based upon contract award
KBR is seeking a highly motivated and career-oriented Information System Security Officer (ISSO) -Intermediate to join our team supporting a government client in Virginia.
Key Responsibilities:
Develop, update, and/or review RMF documentation to include the System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Plan of Action and Milestone (POA&M), Risk Assessment Report (RAR), and Security Assessment Plan (SAP)
Assess system compliance against NIST, DoD, and IC security requirements to include the NIST 800-53 and 800-171 controls, and DISA Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs)
Provide Subject Matter Expert (SME) knowledge on matters related to RMF activities across multiple systems and networks of various classifications
Develop and implement information security policies, procedures, and guidelines in accordance with industry best practices, regulatory requirements, and required government policy (e.g. JSIG, NISPOM, NIST SP 800-171, NIST 800-53)
Participate in sessions aimed at identifying, planning, and executing strategies in response to emerging cybersecurity policies
Maintain awareness and knowledge of evolving security and risk management standards and communicate and apply relevant changes to existing processes
Collaborate with cross-functional teams to ensure the security of new and existing systems and applications
Other duties as assigned
Qualifications Required:
Bachelor's degree with over 5+ years of experience
TS/SCI with polygraph; ability to obtain and maintain Special Access Program (SAP) eligibility and accesses
Must have either CAP or CISSP certification
Knowledge of various Intelligence community security standards
Proficient in firewall administration, intrusion detection systems, anti-virus software, and data encryption
Strong analytical, problem-solving, and decision-making skills
Experience in developing and implementing security policies
Familiarity with web-related technologies (Web applications, Web Services, Service service-oriented architectures) and network/web-related protocols
Provides guidance to junior team members
Develops trusted relationships with Government leaders and with mission partners
Flexible systems thinker with the ability to deliver results quickly
Self-starter with effective time management skills
Strong attention to detail, exceptional organizational and communication skills, effective and clear written (and oral) communication ability, strategic thinking, and interpersonal skills
Qualifications Desired:
Bachelor's degree with over 12 years or more of applicable experience
Demonstrated ability to adapt and flex to the execution of multiple mission sets across a diverse set of programs and tasks
Basic Compensation:
$102,700 - $154,000/year
This range is for the Maryland area only
The offered rate will be based on the selected candidate's work location, knowledge, skills, abilities and/or experience, contract affordability and in consideration of internal parity.
Additional Compensation:
KBR may offer bonuses, commissions, or other forms of compensation to certain job titles or levels, per internal policy or contractual designation. Additional compensation may be in the form of sign on bonus, relocation benefits, short term incentives, long term incentives, or discretionary payments for exceptional performance.
KBR Benefits
KBR offers a selection of competitive lifestyle benefits which could include 401K plan with company match, medical, dental, vision, life insurance, AD&D, flexible spending account, disability, paid time off, or flexible work schedule. We support career advancement through professional training and development.
Belong, Connect and Grow at KBR
At KBR, we are passionate about our people and our Zero Harm culture. These inform all that we do and are at the heart of our commitment to, and ongoing journey toward being a People First company. That commitment is central to our team of team's philosophy and fosters an environment where everyone can Belong, Connect and Grow. We Deliver - Together.
KBR is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, disability, sex, sexual orientation, gender identity or expression, age, national origin, veteran status, genetic information, union status and/or beliefs, or any other characteristic protected by federal, state, or local law.
Auto-ApplySafety and Security Data Analyst
Washington, DC
Job Description The client, operating under a major service contract for a national transportation corporation, is seeking a meticulous Entry-Level Safety & Security Data Analyst to support the client's internal Office of Intelligence and Analysis (OIA) in Washington, D.C. This critical role is responsible for gathering, organizing, and maintaining accurate safety and security data from multiple sources. The Analyst will perform fundamental data analysis, create basic reports (using tools like Microsoft Excel), and produce clear charts and summaries that directly inform operational decision-making and support essential safety and security initiatives across the organization. This is a hybrid position, primarily requiring in-office work (8090%) in Washington, D.C., with an initial duration of six months, subject to extension.
Key Responsibilities
Gather and accurately organize safety and security data collected from various internal and external sources.
Maintain precise data records, ensuring comprehensive data integrity and quality control across all datasets.
Perform basic data analysis, including the use of Microsoft Excel for pivot tables, charts, and complex formulas.
Develop and produce simple, clear reports, charts, and summaries to effectively communicate findings and support decision-making processes.
Collaborate closely with internal OIA and other relevant teams to validate and accurately collect data.
Uphold strict confidentiality and security protocols when handling sensitive and proprietary safety and security data.
Qualifications
Minimum Requirements
Strong proficiency in Microsoft Excel, including advanced functionality (e.g., pivot tables, VLOOKUP, charting).
Demonstrable experience with data collection, maintenance, and basic reporting.
Exceptional attention to detail and a proven ability to maintain accurate, high-integrity records.
Excellent communication skills, both written and verbal, and the ability to work effectively in a collaborative team environment.
Unwavering ability to maintain confidentiality and protect sensitive data.
Preferred Skills
Familiarity or exposure to basic data visualization techniques.
Working knowledge of or familiarity with programming languages such as Python and SQL.
Familiarity with data visualization platforms like Microsoft PowerBI and an understanding of DAX queries.
Prior exposure to or experience with safety, security, or transportation-related data.
Junior Security Analyst
Arlington, VA
SAIC is seeking a **Junior Security Analyst** with an active **TS/SCI clearance** to provide general administrative support to the Office of the Under Secretary of War for Research and Engineering (OUSW(R&E)). is 100% onsite at the Pentagon in Arlington, VA.**
**Key Responsibilities:**
+ Processing CAC and building access applications; access control requests; country and threat briefs; in/out processing of OUSW(R&E) personnel (including civilian, military, Inter-government Personnel Act (IPA)/Detail and Contractor); indoctrinations/debriefings, security record management; courier card application processing; computer/network account access requests; and visit authorization requests.
+ Provide support to OUSW(R&E) personnel as required concerning clearance information and issues with locks, alarm systems, and maintenance of GSA containers in OUSW(R&E) spaces.
+ Run queries of the Defense Information System for Security (DISS) database for clearance information.
+ Provide guidance to OUSW(R&E) personnel on Classification and Declassification, including conducting Original Classification Authority / Derivative Classification trainings as required.
+ Assist OUSW(R&E) with the development of Mission Essential Functions, continuity of operations (COOP) plans, and COOP exercises.
+ Assist in monitoring and maintaining the security of OUSW(R&E)'s Joint Worldwide Intelligence Communications Systems (JWICS) Hotel, ensuring continuous coverage and support. Contribute to monthly activity reports for the Security Directorate.
**Qualifications**
**Required Qualifications:**
+ Bachelor's degree with at least three (3) years of relevant security experience; Master's degree and one (1) year of relevant experience.
+ Strong problem identification/resolution skills, flexibility, and initiative.
+ Proficiency in Microsoft (MS) Office to include PowerPoint, Word, Access and Excel.
+ Ability to work in a dynamic government work environment and have strong interpersonal skills with the ability to work as part of a team.
+ Demonstrated ability to interface with senior level officials within OUSW(R&E) and across stakeholder organizations.
+ U.S. citizenship with active TS/SCI clearance.
**Desired Qualifications:**
+ Previous experience working or interning for an OSD or broader DoD component.
REQNUMBER: 2512080
SAIC is a premier technology integrator, solving our nation's most complex modernization and systems engineering challenges across the defense, space, federal civilian, and intelligence markets. Our robust portfolio of offerings includes high-end solutions in systems engineering and integration; enterprise IT, including cloud services; cyber; software; advanced analytics and simulation; and training. We are a team of 23,000 strong driven by mission, united purpose, and inspired by opportunity. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $6.5 billion. For more information, visit saic.com. For information on the benefits SAIC offers, see Working at SAIC. EOE AA M/F/Vet/Disability
Information Systems Security Manager (ISSM)
McLean, VA
In a world of possibilities, pursue one with endless opportunities. Imagine Next! At Parsons, you can imagine a career where you thrive, work with exceptional people, and be yourself. Guided by our leadership vision of valuing people, embracing agility, and fostering growth, we cultivate an innovative culture that empowers you to achieve your full potential. Unleash your talent and redefine what's possible.
**Job Description:**
Parsons is looking for a talented **Information Systems Security Manager (ISSM)** to join our team! In this role, you will oversee the cybersecurity of information systems, ensuring compliance with federal regulations and implementing security controls to protect system integrity.
**What You'll Be Doing**
+ Oversee the cybersecurity of information systems, certifying compliance with federal regulations (e.g., NIST 800-181).
+ Implement and monitor security controls to protect system integrity, confidentiality, and availability.
+ Conduct risk assessments to identify and mitigate potential vulnerabilities.
+ Manage vulnerabilities and ensure adherence to federal regulations.
**What Required Skills You'll Bring**
+ Bachelor's degree or equivalent.
+ Proven experience in information systems security or cybersecurity management.
+ Strong knowledge of federal regulations such as NIST 800-181 and cybersecurity best practices.
+ Ability to conduct risk assessments and manage vulnerabilities effectively.
+ Exceptional organizational and analytical skills.
**What Desired Skills You'll Bring**
+ Experience implementing and monitoring security controls for information systems.
+ Familiarity with tools and technologies for cybersecurity management.
+ Strong communication skills to collaborate with stakeholders and ensure compliance.
+ Knowledge of strategies to protect system integrity, confidentiality, and availability.
**Security Clearance Requirement:**
An active Top Secret SCI w/Polygraph security clearance is required for this position.
This position is part of our Federal Solutions team.
The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY!
Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to *********************************************** .
About Us
Parsons is a digitally enabled solutions provider focused on the defense, security, and infrastructure markets. With nearly 75 years of experience, Parsons is uniquely qualified to deliver cyber/converged security, technology-based intellectual property, and other innovative services to federal, regional, and local government agencies, as well as to private industrial customers worldwide.
Parsons is an equal opportunity, drug-free employer committed to diversity in the workplace. Minority/Female/Disabled/Protected Veteran/LGBTQ+.
For more about Parsons, visit parsons.com and follow us on Facebook, Twitter, LinkedIn, and YouTube.
Information Systems Security Manager - Intermediate
Springfield, VA
RiVidium Inc, (dba TripleCyber), is seeking an individual to be responsible for the cybersecurity of a program, organization, system, or enclave. Responsibilites and abilities for this position shall include, but not limited to:
Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.
Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program.
Advise senior management (e.g., Chief Information Officer [CIO]) on risk levels and security posture.
Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements.
Advise appropriate senior leadership or Authorizing Official of changes affecting the organization's cybersecurity posture.
Collect and maintain data needed to meet system cybersecurity reporting.
Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.
Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance.
Ensure that security improvement actions are evaluated, validated, and implemented as required.
Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment.
Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s).
Ensure that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture.
Establish overall enterprise information security architecture (EISA) with the organization's overall security strategy.
Evaluate and approve development efforts to ensure that baseline security safeguards are appropriately installed.
Evaluate cost/benefit, economic, and risk analysis in decision-making process.
Identify alternative information security strategies to address organizational security objectives.
Identify information technology (IT) security program implications of new technologies or technology upgrades.
Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information.
Interpret and/or approve security requirements relative to the capabilities of new information technologies.
Interpret patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program.
Lead and align information technology (IT) security priorities with the security strategy.
Lead and oversee information security budget, staffing, and contracting.
Manage the monitoring of information security data sources to maintain organizational situational awareness.
Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency.
Manage threat or target analysis of cyber defense information and production of threat information within the enterprise.
Monitor and evaluate the effectiveness of the enterprise's cybersecurity safeguards to ensure that they provide the intended level of protection.
Oversee the information security training and awareness program.
Participate in an information security risk assessment during the Security Assessment and Authorization process.
Participate in the development or modification of the computer environment cybersecurity program plans and requirements.
Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations.
Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans.
Provide leadership and direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities.
Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
Ability to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements).
Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
Preferred Qualifications to include:
Experience in log auditing and audit logging.
Understanding of AWS
Help Desk Experience
ITIL V4 Foundation: A familiarity with at least one ITIL V4 component is desirable.
Requirements for this position shall include:
Associate's degree or higher from an accredited college or university (Prefer an accredited Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree, or a degree in a Mathematics or Engineering field.)
Information Systems Security Manager (ISSM)
McLean, VA
Clearance: TS/SCI w/ Poly
Position Overview At JMark, protecting information systems is mission-critical. We are seeking Information Systems Security Managers (ISSMs) across multiple discipline levels to oversee the cybersecurity of classified and sensitive systems. This role ensures compliance with federal regulations, implements robust security controls, and manages risks to maintain the integrity, confidentiality, and availability of mission-essential information systems. Key Responsibilities Cybersecurity Oversight & Compliance
Oversee the cybersecurity posture of information systems, ensuring compliance with CMMC, NIST 800-181, and other federal standards.
Develop, implement, and monitor security controls to protect system integrity, confidentiality, and availability.
Risk Assessment & Vulnerability Management
Conduct risk assessments to identify threats, vulnerabilities, and potential impacts.
Manage vulnerability remediation in coordination with system owners, administrators, and stakeholders.
Policy Enforcement & Reporting
Enforce compliance with federal cybersecurity policies, regulations, and organizational standards.
Maintain documentation and prepare reports to support audits, inspections, and system accreditation.
Continuous Monitoring & Incident Response
Monitor systems for security events and respond to incidents.
Recommend corrective and preventive actions and ensure secure system configurations.
Success Factors The ideal candidate will be:
Cybersecurity-Savvy & Compliance-Oriented - Expert in federal frameworks and regulations.
Analytical & Risk-Focused - Skilled at identifying vulnerabilities and applying effective mitigations.
Detail-Oriented & Proactive - Maintains precise documentation and anticipates emerging threats.
Collaborative & Mission-Driven - Works across teams to align cybersecurity with operational objectives.
Qualifications
Bachelor's degree in Cybersecurity, Information Technology, or related field.
0-15+ years of experience in information systems security, cybersecurity compliance, or ISSM roles (multi-discipline levels available).
Strong knowledge of NIST standards, RMF (Risk Management Framework), and federal cybersecurity regulations.
Experience in risk assessment, vulnerability management, and incident response.
Preferred
Experience supporting ODNI, IC, or DoD information security operations.
Cybersecurity certifications such as CISSP, CISM, CAP, or Security+.
Why Join JMark? At JMark, cybersecurity is the backbone of mission assurance. As an Information Systems Security Manager, you will safeguard critical systems, manage cyber risks, and ensure compliance to protect national security operations. Your expertise. Our mission. One standard: excellence.
Junior (Jr.) Information System Security Officer (ISSO)
Fairfax, VA
ECS is seeking a Junior (Jr.) Information System Security Officer (ISSO) to work remotely. ECS Federal, LLC is seeking a highly qualified Junior Level Information System Security Officer (ISSO) with an active Secret clearance to support our DoD client, located in Seaside, CA and Alexandria, VA. This position can be remote, but preferably in close proximately to the National Capital Region (NCR). The selected, highly motivated candidate will serve as the advisor to one or more Information System Owners, ATO Program Owner, and Information System Security Manager (ISSM) on all matters, involving the security of an information system.
* Serve as a Junior ISSO to one or more Boundary/System Owner and ISSM on all matters (technical or otherwise) involving the security
* Provide support under senior leadership guidance that appropriate security controls and measures are in place to safeguard DHRA/DMDC systems, applications, networks, and data
* ATO Program Owner Support
* Under the supervision of a senior RMF staff member, Jr. ISSO will perform the following:
* Act as a facilitator between Program and Product Owners and other Cybersecurity stakeholders for coordination of communication and activities within eMASS
* Advise program stakeholders on ATO requirements and identify any missing information in eMASS
* Explain non-compliant controls and propose solutions to stakeholders
* Provide support for program teams on eMASS toolset usage, RMF policies, and additional cybersecurity topics, e.g., cATO, system network traffic diagrams, documenting PPSM, RMF control remediation, etc.
* Support Program/Product Owner for their given assessments, validations, and audits with respect to eMASS access and clarifications
* EMASS
* Under the supervision of a senior RMF staff member, Jr. ISSO will perform the following:
* Monitor RMF authorization status through eMASS and maintain and communicate a schedule of actions and timelines needed to obtain and sustain system/application authorization
* Create and maintain entries within eMASS instances for applications with required artifacts associated with the relevant Common Control Identifier (CCI) security controls. Artifacts will be provided by DHRA program, product, or project managers
* Maintain the documentation for RMF Assessment and Authorization of each information system in accordance with government requirements, with all required artifacts in eMASS
* STIGS
* Under the supervision of a senior RMF staff member, Jr. ISSO will perform the following:
* Develop STIG/Control crosswalk documentation to application functionalities to determine how those controls impact the app/system; upon mitigation then take the necessary supporting documentation and screenshots from program, product or project managers and update the associated controls and POAMs in eMASS
* Utilize the assigned tool, such as eMASSTER to generate STIG results, and assigned actions for remediation. Other STIG tools may be applicable
* POA&Ms
* Under the supervision of a senior RMF staff member, Jr. ISSO will perform the following:
* Ensure POAM entries are kept current in eMASS and report on POAM statuses. Submit POAM workflow requests in eMASS for item closure or extension.
* Coordinate with stakeholders to develop POA&M milestones, identify and allocate resources and determine the remediation schedule
* Create presentations and metrics as requested. Create weekly, monthly, and in-progress review presentations, as needed
Salary Range: $115,000 - $130,000
General Description of Benefits
* Must be a US citizen, possess a Secret Clearance, and be willing to acquire and maintain a DoD Top Secret clearance if requested
* Bachelor's degree in computer science, cybersecurity, information security, or similar discipline AND 1 to 2+ years of cybersecurity experience, in support of the DoD or other federal clients (education/experience substitution allowed)
* Active DoD 8570 certification minimum compliance, including at least one of the following certifications in good standing: CASP+ Security+, CISSP, CISA, CISM
* Understanding of the NIST Special Publications, DoD Risk Management Framework (RMF) processes and NIST 800-53 security controls
* Experience developing and managing POAMS in eMASS
* Experience with reviewing vulnerability scans and suggesting mitigation techniques
* Technical knowledge to review DISA Security Technical Implementation Guides (STIGs)
* Ability to communicate effectively with government and contract leadership, while conveying highly technical concepts to both technical and nontechnical stakeholders
* Capacity to thrive in a complex, fast paced environment with competing demands while delivering consistent, high-quality commitment to mission-critical systems and solutions
Enterprise Security System (ESS) Admin
Washington, DC
IT-DOSS Enterprise Security System (ESS) Administrator Strategic Resources, Inc. (SRI) is an international, ISO 9001/20000/27001 Certified, CMMI Level 3 Rated full-service provider with more than 37 years of experience in the Federal, military, and commercial marketplaces. SRI is seeking an experienced ESS Administrator.
Overview: The ESS Administrator is the senior technical specialist responsible for managing, configuring, securing, and maintaining Enterprise Security System environment, including servers, databases, storage components, and security platforms that support access control, intrusion detection, and related critical safety systems.
This role ensures that ESS services remain operational, resilient, secure, and compliant with requirements. The Administrator supports all system integrations, monitoring, SLA metrics, maintenance windows, and cross-functional coordination needed to deliver reliable enterprise security services under IT-DOSS.
Task and Responsibilities:
* ESS System Administration & Maintenance
* Application & Systems Integration
* Cybersecurity & Risk Management
* Business Continuity & Disaster Recovery
* Performance Management & Reporting
* Maintain ESS diagrams, SOPs, configuration baselines, and technical documentation.
* Update Infrastructure & Systems Documentation by the 15th of each month.
* Ensure Task/Work Performed Documentation is updated within one business day.
* Support ITIL-aligned processes including Incident, Problem, Change, Asset, and Knowledge Management.
* Work with the IT Service Desk Ticketing Administrator to align ESS workflows with ITSM reporting and SLA measurement methods.
* PPS, After-Hours, and Surge Support
Minimum Required Education, Skills, Knowledge, and Abilities:
* Expertise in server, database, storage, and security technologies needed to design, install, configure, administer, manage, upgrade, troubleshoot, diagnose, test, monitor, and document the ESS environment.
* Demonstrated, creditable experience supporting enterprise ESS or similar access control/security management platforms.
* Experience with configuration, optimization, and health management of security system components.
* Strong understanding of secure architecture principles and system hardening.
Preferred Qualifications:
* Bachelor's degree in IT, Cybersecurity, Computer Engineering, or related field.
* Experience with federal or DHS security systems environments, including physical access control or intrusion detection systems.
* Experience with:
* SQL or other database back-ends used by ESS systems
* Scripting or automation tools (PowerShell, Python)
* Storage architectures supporting video or security log retention
* Familiarity with STIGs, SCAP, and DHS cybersecurity compliance processes.
* ITIL certification or prior experience supporting ITIL-aligned operations.
This job description is intended to outline the general nature and level of work being performed. It is not intended to be a comprehensive list of all responsibilities, duties and skills required of the position. Additional tasks may be assigned as needed.
Malware Defense Malware Analyst
Washington, DC
Washington, District of Columbia;Chicago, Illinois; Denver, Colorado **To proceed with your application, you must be at least 18 years of age.** Acknowledge Refer a friend **To proceed with your application, you must be at least 18 years of age.** Acknowledge (******************************************************************************************************
**Job Description:**
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
Bank of America is one of the world's leading financial institutions, serving over 66 million consumers and small businesses. Company success is only possible with a strong cyber defense, which enables Bank of America to safely conduct global operations across the United States and in approximately 35 countries. Our primary goal is to safeguard not only the company, but our clients and their trust. The Malware Defense Team is looking for top talent who would like to join one of the most advanced cybersecurity teams in the world.
Responsibilities include, but are not limited to:
- In-depth analysis of malware, including authoring analysis reports.
- Tracking malware campaigns, malicious actors, and related infrastructure.
- Creation of tools and scripts to assist in the analysis of malware analysis.
- Field escalations of potentially malicious files and websites from teams within Malware Defense.
Required Qualifications:
- Strong direct experience of analyzing malware.
- Intermediate to advanced malware analysis skills.
- Experience creating innovative ways to track progression of malware families, infrastructure, and campaigns conducted by e-crime, and cyber espionage actors.
- Experience creating tools and scripts to accelerate malware and threat analysis.
- Background in network traffic analysis - WireShark, Fiddler, proxy logs, etc.
- Experience analyzing malicious web content such as ClickFix, ClearFake, SocGholish, etc.
- Experience authoring YARA, Suricata, and EKFiddle detection rules.
- Experience with penetration testing and/or adversary emulation is a plus.
- Able to work independently on tasks, but also work well within a team environment
Desired Qualifications:
- Experience analyzing malware targeting Linux, Android, and IOT platforms.
Skills:
+ Cyber Security
+ Data Privacy and Protection
+ Problem Solving
+ Process Management
+ Threat Analysis
+ Business Acumen
+ Data and Trend Analysis
+ Interpret Relevant Laws, Rules, and Regulations
+ Risk Analytics
+ Stakeholder Management
+ Access and Identity Management
+ Data Governance
+ Encryption
+ Information Systems Management
+ Technology System Assessment
**Shift:**
1st shift (United States of America)
**Hours Per Week:**
40
Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.
View your **"Know your Rights (************************************************************************************** "** poster.
**View the LA County Fair Chance Ordinance (************************************************************************************************** .**
Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. Should you be offered a role with Bank of America, your hiring manager will provide you with information on the in-office expectations associated with your role. These expectations are subject to change at any time and at the sole discretion of the Company. To the extent you have a disability or sincerely held religious belief for which you believe you need a reasonable accommodation from this requirement, you must seek an accommodation through the Bank's required accommodation request process before your first day of work.
This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.
Information Systems Security Manager (ISSM)
McLean, VA
In a world of possibilities, pursue one with endless opportunities. Imagine Next! At Parsons, you can imagine a career where you thrive, work with exceptional people, and be yourself. Guided by our leadership vision of valuing people, embracing agility, and fostering growth, we cultivate an innovative culture that empowers you to achieve your full potential. Unleash your talent and redefine what's possible.
Job Description:
Parsons is looking for a talented Information Systems Security Manager (ISSM) to join our team! In this role, you will oversee the cybersecurity of information systems, ensuring compliance with federal regulations and implementing security controls to protect system integrity.
What You'll Be Doing
* Oversee the cybersecurity of information systems, certifying compliance with federal regulations (e.g., NIST 800-181).
* Implement and monitor security controls to protect system integrity, confidentiality, and availability.
* Conduct risk assessments to identify and mitigate potential vulnerabilities.
* Manage vulnerabilities and ensure adherence to federal regulations.
What Required Skills You'll Bring
* Bachelor's degree or equivalent.
* Proven experience in information systems security or cybersecurity management.
* Strong knowledge of federal regulations such as NIST 800-181 and cybersecurity best practices.
* Ability to conduct risk assessments and manage vulnerabilities effectively.
* Exceptional organizational and analytical skills.
What Desired Skills You'll Bring
* Experience implementing and monitoring security controls for information systems.
* Familiarity with tools and technologies for cybersecurity management.
* Strong communication skills to collaborate with stakeholders and ensure compliance.
* Knowledge of strategies to protect system integrity, confidentiality, and availability.
Security Clearance Requirement:
An active Top Secret SCI w/Polygraph security clearance is required for this position.
This position is part of our Federal Solutions team.
The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY!
Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to ************************************************
Auto-ApplyJunior Information Systems Security Officer
Columbia, MD
**Leidos** has a new and exciting opportunity for a **Junior Information Systems Security Officer (ISSO)** in our **National Security Sector's (NSS) Cyber & Analytics Business Area (CABA)** . Our talented team is at the forefront in Security Engineering, Computer Network Operations (CNO), Mission Software, Analytical Methods and Modeling, Signals Intelligence (SIGINT), and Cryptographic Key Management. At **Leidos** , we offer **competitive benefits Leidos Pay and Benefits (********************************************* , including 4 or more weeks Paid Time Off, 11 paid Holidays, 401K with a 6% company match and immediate vesting, Flexible Schedules, Discounted Stock Purchase Plans, Technical Upskilling, Education and Training Support, Parental Paid Leave, and much more. **Join us and make a difference in National** **Security!**
We are seeking a motivated and detail-oriented **Junior Information System Security Officer (ISSO)** to support our cybersecurity operation in Columbia, MD. The ideal candidate will have foundational knowledge of the Risk Management Framework (RMF) process and a strong desire to grow in the field of information security and compliance.The candidate will support the company's system infrastructure system security plan and all related processes under the guidance of the Lead ISSO. **This is an excellent opportunity for individuals looking to start their career in cybersecurity** .
**Primary Responsibilities**
+ Assist the Lead ISSO in implementing and maintaining cybersecurity policies, procedures, and controls and other duties as assigned.
+ Monitor and report security incidents and vulnerabilities.
+ Conduct weekly reviews of systems audit logs and vulnerability scan results.
+ Maintain records to include user account management, workstations, servers, network switches, etc.
+ Develop and update documentation for Standard Operating Procedures (SOPs).
+ Perform Data Transfer Agent responsibilities
+ Assist with management of security aspects of the information system and perform day-to-day security operations of the system.
**Basic Qualifications**
+ High school diploma required; bachelor's degree in a related technical field preferred (experience may be considered in lieu of degree).
+ Minimum of **2 years of relevant experience** .
+ Current **DoD 8140.03-compliant IAM Level I certification** (e.g., **CompTIA Security+** , **(ISC)² CAP** , or **GIAC GSLC** ) and ability to maintain compliance throughout employment.
+ Working knowledge of **Risk Management Framework (RMF)** , **NIST** , and **CNSS** cybersecurity requirements, including **NIST 800-53 security controls** and compliance frameworks.
+ Strong understanding of **cybersecurity risk management techniques** .
+ Excellent **verbal and written communication skills** ; able to communicate effectively across all levels of the organization.
+ Ability to **work independently and collaboratively** within a team, demonstrating adaptability, organization, and problem-solving skills.
+ **Clearance Requirement: Active Top Secret/SCI w/polygraph**
**Preferred Qualifications**
+ Background in System Administration is a plus.
+ Experience with eMass
+ Ability to maintain security artifacts and documentation.
If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo - because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 - and moving faster than anyone else dares.
**Original Posting:**
December 3, 2025
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
Pay Range $69,550.00 - $125,725.00
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
**About Leidos**
Leidos is an industry and technology leader serving government and commercial customers with smarter, more efficient digital and mission innovations. Headquartered in Reston, Virginia, with 47,000 global employees, Leidos reported annual revenues of approximately $16.7 billion for the fiscal year ended January 3, 2025. For more information, visit ************** .
**Pay and Benefits**
Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available at **************/careers/pay-benefits .
**Securing Your Data**
Beware of fake employment opportunities using Leidos' name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system - never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at ***************************** .
If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission (******************************* .
**Commitment to Non-Discrimination**
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.
REQNUMBER: R-00171439
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
Easy ApplyInformation Systems Security Officer, Level 1 (ISSO)
Columbia, MD
What you will be doing: As an Information Systems Security Officer Level 1 you will be responsible for supporting and maintaining the security posture of classified and sensitive government information systems. You will assist in implementing and monitoring security controls in accordance with the NIST Risk Management Framework (RMF), DoD, and Intelligence Community (IC) policies and standards.
In this role, you will perform hands on security operations supporting Assessment and Authorization (A&A) activities, conducting risk and vulnerability assessments, and ensuring that systems remain compliant throughout their lifecycle. You will work closely with system administrators, engineers, and security managers to document, enforce, and continuously improve the organization's information assurance posture.
This position is ideal for a motivated cybersecurity professional eager to contribute to mission success by ensuring the confidentiality, integrity, and availability of critical systems in a high impact, secure environment.
Key Responsibilities:
Provide cybersecurity support for programs, systems, or organizational enclaves
Develop, implement, and enforce IT security policies and methodologies
Maintain the operational security posture of systems under your purview
Coordinate and manage security authorization processes (A&A)
Prepare and maintain documentation including SSPs, SCTMs, POA&Ms, and Risk Assessments
Evaluate and implement security controls to meet NIST, DoD, and IC requirements
Perform and document vulnerability/risk assessments and baseline evaluations
Support configuration management and assess security impact of system changes
Initiate reauthorization or decommissioning processes as needed
Track and close out security liens and respond to IAVAs
Recognize, report, and respond to cybersecurity incidents and violations
Conduct audit log reviews and continuous monitoring activities
Deliver security awareness training and provide ongoing compliance oversight
Collaborate with system/network admins to document data flow and system architecture
Lead and support corrective actions when vulnerabilities are discovered
Maintain system compliance through ongoing assessment and remediation
Required Skills & Qualifications:
Strong understanding of the NIST Risk Management Framework (RMF)
Familiarity with security tools, encryption technologies, and communication protocols
Knowledge of applicable IA policies, controls, and continuous monitoring strategies
Ability to lead system authorization activities and manage security documentation
Experience in audit log analysis and vulnerability management
Excellent verbal and written communication skills
Self-starter with strong problem-solving, leadership, and teamwork skills
Availability to respond to after-hours requests in a 24/7 support environment
Education and Experience:
Bachelor's degree in Computer Science, Information Technology, or a related discipline from an accredited college or university
Five (5) years of experience as an ISSO supporting systems of similar scope, type, and complexity
Four (4) years of additional ISSO experience may substitute for the required degree
Clearance Requirement:
Must possess an active TS/SCI with appropriate Polygraph to be considered for this role
Why Choose Independent Software:
At Independent Software, our people are the mission. We've built a company around collaboration, integrity, and innovation and we make sure our team has the tools and support to grow, succeed, and thrive.
When you join us, you will:
Support critical national security missions that matter
Be part of a close-knit, employee-first culture where your voice is heard
Expand your skills through ongoing training, mentorship, and career development
Enjoy competitive compensation, generous benefits, and work-life balance
Ready to take the next step in your career? Join us and be part of something bigger.
Apply today.
We're an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.
Auto-ApplyInformation Systems Security Manager
Arlington, VA
About Us Georgia Tech prides itself on its technological resources, collaborations, high-quality student body, and its commitment to building an outstanding and diverse community of learning, discovery, and creation. We strongly encourage applicants whose values align with our institutional values, as outlined in our Strategic Plan. These values include academic excellence, diversity of thought and experience, inquiry and innovation, collaboration and community, and ethical behavior and stewardship. Georgia Tech has policies to promote a healthy work-life balance and is aware that attracting faculty may require meeting the needs of two careers.
About Georgia Tech
Georgia Tech is a top-ranked public research university situated in the heart of Atlanta, a diverse and vibrant city with numerous economic and cultural strengths. The Institute serves more than 45,000 students through top-ranked undergraduate, graduate, and executive programs in engineering, computing, science, business, design, and liberal arts. Georgia Tech's faculty attracted more than $1.4 billion in research awards this past year in fields ranging from biomedical technology to artificial intelligence, energy, sustainability, semiconductors, neuroscience, and national security. Georgia Tech ranks among the nation's top 20 universities for research and development spending and No. 1 among institutions without a medical school.
Georgia Tech's Mission and Values
Georgia Tech's mission is to develop leaders who advance technology and improve the human condition. The Institute has nine key values that are foundational to everything we do:
1. Students are our top priority.
2. We strive for excellence.
3. We thrive on diversity.
4. We celebrate collaboration.
5. We champion innovation.
6. We safeguard freedom of inquiry and expression.
7. We nurture the wellbeing of our community.
8. We act ethically.
9. We are responsible stewards.
Over the next decade, Georgia Tech will become an example of inclusive innovation, a leading technological research university of unmatched scale, relentlessly committed to serving the public good; breaking new ground in addressing the biggest local, national, and global challenges and opportunities of our time; making technology broadly accessible; and developing exceptional, principled leaders from all backgrounds re
Job Summary
The Information Systems Security Manager (ISSM) is responsible for developing and implementing security protocols to safeguard information systems. This position focuses on monitoring system performance, conducting security audits, and providing expert guidance on best practices to ensure the integrity of information systems.
Responsibilities
Job Duty 1 -
Develop and implement security protocols for information systems to safeguard sensitive information and ensure compliance with institutional standards
Job Duty 2 -
Provide detailed reports on information systems security status and incidents to senior management, highlighting areas for improvement and compliance
Job Duty 3 -
Collaborate with Information Technology departments to integrate security measures into new information systems and ensure that existing systems meet security requirements
Job Duty 4 -
Perform other duties as assigned
Job Duty 5 -
Monitor the performance of information systems by conducting regular security audits and assessments to identify potential weaknesses
Job Duty 6 -
Provide expert guidance to faculty and staff on best practices for information systems security, ensuring they understand their role in maintaining security protocols
Job Duty 7 -
Analyze security incidents related to information systems by investigating breaches and proposing corrective measures to prevent future occurrences
Job Duty 8 -
Maintain accurate documentation of security procedures and incidents to ensure transparency and facilitate future audits and assessments
Job Duty 9 -
Train staff on information systems security policies and procedures, fostering a culture of security awareness among all users
Job Duty 10 -
Stay current on developments in information systems security by participating in professional development activities and reviewing relevant literature
Required Qualifications
Educational Requirements
Associate degree in related discipline or equivalent, related experience
Required Experience
No prior relevant work experience required
Preferred Qualifications
Preferred Educational Qualifications
Bachelor's degree in related discipline or equivalent, related experience
Other Preferred Qualifications
* Demonstrated expertise with federal cybersecurity frameworks, including NIST SP 800-53, JSIG, ICD 503, and DoD RMF.
* Proven experience implementing and maintaining compliance with RMF, DAAPM, NISPOM, JSIG, or comparable security standards.
* Proficient in the use of cybersecurity tools such as eMASS, ACAS, Tenable/Nessus, Splunk, and other compliance or vulnerability management platforms.
* Strong leadership abilities with exceptional communication and cross-functional collaboration skills.
* Hands-on experience managing and securing systems within classified or controlled environments.
* Exceptional written and verbal communication skills, with the ability to convey complex technical information clearly and effectively.
USG Core Values
The University System of Georgia is comprised of our 26 institutions of higher education and learning as well as the System Office. Our USG Statement of Core Values are Integrity, Excellence, Accountability, and Respect. These values serve as the foundation for all that we do as an organization, and each USG community member is responsible for demonstrating and upholding these standards. More details on the USG Statement of Core Values and Code of Conduct are available in USG Board Policy 8.2.18.1.2 and can be found on-line at **************************************************************************
Additionally, USG supports Freedom of Expression as stated in Board Policy 6.5 Freedom of Expression and Academic Freedom found on-line at ************************************************
Equal Employment Opportunity
The Georgia Institute of Technology (Georgia Tech) is an Equal Employment Opportunity Employer. The Institute is committed to maintaining a fair and respectful environment for all. To that end, and in accordance with federal and state law, Board of Regents policy, and Institute policy, Georgia Tech provides equal opportunity to all faculty, staff, students, and all other members of the Georgia Tech community, including applicants for admission and/or employment, contractors, volunteers, and participants in institutional programs, activities, or services. Georgia Tech complies with all applicable laws and regulations governing equal opportunity in the workplace and in educational activities.
Equal opportunity and decisions based on merit are fundamental values of the University System of Georgia ("USG") and Georgia Tech. Georgia Tech prohibits discrimination, including discriminatory harassment, on the basis of an individual's race, ethnicity, ancestry, color, religion, sex (including pregnancy), national origin, age, disability, genetics, or veteran status in its programs, activities, employment, and admissions. Further, Georgia Tech prohibits citizenship status, immigration status, and national origin discrimination in hiring, firing, and recruitment, except where such restrictions are required in order to comply with law, regulation, executive order, or Attorney General directive, or where they are required by Federal, State, or local government contract.
Other Information
This is not a supervisory position.
This position does not have any financial responsibilities.
This position will not be required to drive.
This role is not considered a position of trust.
This position does not require a purchasing card (P-Card).
This position will not travel.
This position does require security clearance.
This position is located in Arlington, VA
Salary Job Grade T06
Salary range is dependent on candidate's experiences and skill sets: $90,979 - $254,000
Must a US citizen for this position
Background Check
Successful candidate must be able to pass a background check. Please visit *******************************************************************
Junior Information System Security Officer (ISSO)
Washington, DC
Be Challenged and Make a Difference In a world of technology, people make the difference. We believe if we invest in great people, then great things will happen. At AnaVation, we provide unmatched value to our customers and employees through innovative solutions and an engaging culture.
Description of Task to be Performed:Come join our growing team and make a difference every day! AnaVation is seeking a motivated Junior Information System Security Officer (ISSO). This junior-level role is ideal for someone eager to build experience in cybersecurity compliance and risk management in a mission-driven environment.
Key responsibilities include:• Support the development and maintenance of ATO/ATT documentation for low to moderate-impact systems• Assist with system security assessments and control evaluations under the Risk Management Framework (RMF)• Maintain security artifacts and documentation in JCAM• Conduct biweekly reviews of system logs and vulnerability scan results• Track and manage POA&Ms in coordination with senior ISSOs and system owners• Participate in continuous monitoring, training exercises, and contingency planning events• Ensure compliance with cybersecurity policies and NIST SP 800-53 control
This position is full-time onsite with our customer in a Metro-accessible location in Washington, DC.Required Qualifications:
Education: Bachelor's degree in Cybersecurity, Information Technology, or a related field. In lieu of a degree, a
minimum of two (2) years of hands-on relevant experience is required.
Experience: 2 years
Required Skills/Certs:
Minimum two (2) years of hands-on experience in Governance Risk and Compliance and the RMF process.
Proficient with Federal policies, program standards, and NIST Special Publications guidelines to include but not limited to such as NIST SP 800-53, 800-37, 800-137.
Experience supporting system security documentation, control assessments, and ATO or ATT packages for low to moderate-impact systems.
Proficient on how to use various security tools, such as but not limited to: JCAM (or an equivalent GRC tool), Tenable, BigFix, and Splunk (or SIEM), and/or equivalent.
Familiarity with tools such as JCAM and common security documentation templates.
Exposure to POA&M tracking, audit support, and vulnerability scanning processes
Ability to draft and maintain basic cybersecurity documentation (e.g., SSP, CMP, IRP)
Detail-oriented with solid organizational and documentation skills
Ability to brief technical content to non-technical leadership
Proficient in Microsoft Office Suite (Word, Excel, PowerPoint)
Required Clearance:
Ability to obtain Public Trust clearance; Secret clearance strongly preferred.
Preferred Qualifications:
CompTIA Security+
CGRC (formerly CAP), CEH, or equivalent entry-level cybersecurity certification
Benefits · Generous cost sharing for medical insurance for the employee and dependents · 100% company paid dental insurance for employees and dependents · 100% company paid long-term and short term disability insurance · 100% company paid vision insurance for employees and dependents · 401k plan with generous match and 100% immediate vesting · Competitive Pay · Generous paid leave and holiday package · Tuition and training reimbursement · Life and AD&D Insurance
About AnaVation AnaVation is the leader in solving the most complex technical challenges for collection and processing in the U.S. Federal Intelligence Community. We are a US owned company headquartered in Chantilly, Virginia. We deliver groundbreaking research with advanced software and systems engineering that provides an information advantage to contribute to the mission and operational success of our customers. We offer complex challenges, a top-notch work environment, and a world-class, collaborative team.
If you want to grow your career and make a difference while doing it, AnaVation is the perfect fit for you!
AnaVation is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.
Auto-ApplyIAM and Security Systems Analyst
Washington, DC
About the Role: We are seeking a highly skilled IAM and Security Systems Analyst to support the design, implementation, and operation of critical security controls across our infrastructure, cloud, and application environments. While the title reflects an analyst level, the role requires a hands-on engineering mindset with deep technical experience in identity management, security tooling, and threat detection.
This individual will play a key role in securing our systems, applications, and data by evaluating, implementing, and managing tools and processes across the security stack, from access governance to application security, SIEM operations, and incident response.
Key Responsibilities
Identity & Access Management (IAM)
Manage and support identity platforms including Active Directory, Azure AD, and Okta.
Implement RBAC, least privilege principles, and automated provisioning/deprovisioning.
Conduct periodic access reviews and support access certification processes.
Integrate IAM controls into application and cloud environments.
Security Engineering & Tooling
Administer and optimize Mimecast, OKTA, Microsoft Defender, Intune, and other endpoint/cloud security tools.
Manage SIEM tools including rule tuning, log ingestion, and correlation.
Implement and automate application code reviews using security scanning tools (e.g., SAST, DAST).
Perform application security testing and contribute to threat modeling and risk evaluations.
Lead cloud control monitoring, data protection measures, and compliance reporting.
Threat Detection & Incident Response
Conduct analysis of security alerts and lead incident response efforts.
Leverage threat intelligence to update detection mechanisms and enhance response playbooks.
Perform root cause analysis and evidence handling following incidents.
Support red team/blue team exercises and penetration testing activities.
Architecture, Process & SDLC Integration
Review and evaluate system and application security architectures.
Support integration of security controls across the SDLC and DevSecOps pipelines.
Design and continuously improve security processes and documentation.
Participate in security metrics and reporting efforts to track control effectiveness.
Support SOC design discussions and contribute to its operational maturity.
Collaboration & Compliance
Partner with IT Operations teams, Infrastructure, HR, and Compliance to support security initiatives.
Assist with internal and external audits, control documentation, and evidence collection.
Maintain awareness of frameworks such as SOC 2, NIST, and ISO 27001.
Help run awareness training, phishing simulations, and risk assessments.
This is a hybrid
role
that will require regular in-person work in office for work tasks and/or activities for coaching and support of our students. You must live within a commutable distance to either Boston, MA, New York City, NY, or Washington DC.
Salary Range: $90,000-$110,000/annually
Required Qualifications
3-5 years of experience in a security engineering or analyst role
Strong experience with IAM platforms (Active Directory, Azure AD, Okta)
Proficient in SIEM platforms, incident response, and Microsoft security tools
Experience with automated security testing tools (SAST, DAST)
Familiarity with cloud security (Microsoft 365, Azure) and application security principles
Hands-on experience in scripting/automation (PowerShell, Python, or Terraform a plus)
Strong understanding of network protocols, system hardening, and endpoint defense
Excellent problem-solving and communication skills
Preferred Qualifications
Familiarity with red teaming, penetration testing, and threat modeling
Exposure to compliance frameworks such as SOC 2, HIPAA, or ISO 27001
Participation in SOC design or operations
Experience with security metrics/reporting and risk assessments
Why Join Us:
You'll be part of a mission-driven team focused on protecting a modern IT and cloud-first organization. This is an opportunity to shape and grow a scalable security program, drive impact across critical systems, and mature key security domains.
#LI-HybridCOMPENSATION & BENEFITS:
Year Up United has established salary ranges for each of our sites, which allows us to pay employees competitively, equitably and consistently in different geographic markets. For roles in which the location is listed as flexible, the range displayed reflects the minimum and maximum target for new hire salaries for the position across all US locations. Salary offers take into account a candidate's skills, experience, and location. Your recruiter can share more about the specific salary range for your location during the hiring process.
Benefits: Comprehensive healthcare options and dental coverage; 401(k) match for eligible participants.
Vacation: Earn three weeks paid vacation in first year of employment; four weeks after initial year.
Professional Development: Funds available to support staff in achieving career objectives ($2,500 per year)
** This is an exempt role (paid on a salaried basis). **
ORGANIZATION DESCRIPTION:
Year Up United is a national 501(c)3 workforce development organization committed to ensuring equitable access to economic opportunity, education, and justice for all young adults-no matter their background, income, or zip code. Employers face a growing need for talent while millions of talented young adults lack access to meaningful careers. These inequities only further perpetuate the opportunity gap that exists in our country-a gap that Year Up United is determined and positioned to close through three interconnected strategies: providing targeted skills training and connections to livable-wage employment for students and alumni; empowering others to serve and support young adults, and changing systems that perpetuate the opportunity gap. Year Up United's intensive training program utilizes a high expectations, high support model where students learn in-demand technical and professional skills and apply them during a corporate internship. Year Up United has directly served more than 40,000 young adults since its founding in 2000. Year Up United's nationwide presence includes Arizona, Austin, Bay Area, Charlotte, Chicago, Dallas/Fort Worth, Greater Atlanta, Greater Boston, Greater Philadelphia, Jacksonville, Los Angeles, the National Capital Region, New York City/Jersey City, Pittsburgh, Puget Sound, Rhode Island, South Florida, Tampa Bay, and Wilmington.
Voted one of the Best Nonprofits to Work For in the country by The NonProfit Times, Year Up United is a rewarding and impactful place to work. Our staff is passionate, supportive, mission-driven, and committed to positive change and continuous learning. We set high standards for both ourselves and our students and live by a set of core values that reflect an unshakable belief in the talent and potential of our young people. The work we do is life-changing, and we know that our team is the greatest asset in achieving our mission.
COMMITMENT TO DIVERSITY:
Year Up United embraces diversity and equal opportunity in a serious way. All aspects of employment, including the decision to hire, promote, discharge, or discipline, are based on meritocracy. We do not permit discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristics protected by federal, state, or local laws. Learn more about our commitment to diversity: ***************************************************************
Year Up United is also committed to working with and providing reasonable accommodations to individuals with disabilities. Your recruiter can provide details regarding the expected work environment and any physical requirements. Please let our hiring team know if you need an accommodation at any point during the interview process. Information received relating to accommodation will be addressed confidentially.
TO APPLY:
Please submit a thoughtful cover letter and resume through our website.
Note that applications without a cover letter will not be considered. We respectfully request no phone calls.
Auto-ApplyInformation Systems Security Engineer Level 1 (ISSE 1)
Columbia, MD
Corporation At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support.
As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with.
ARSIEM is currently looking for an Information Systems Security Engineer 1 to participate as a security engineering representative on engineering teams for the design, development, implementation, and/or integration of secure networking, computing, and enclave environments. This position will support one of our Government clients in Columbia, MD.
Responsibilities
Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies.
Validate and verify system security requirements definitions and analysis and establishes system security designs.
Design, develop, implement and/or integrate IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements.
Build IA into systems deployed to operational environments.
Assist architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions.
Support the building of security architectures.
Enforce the design and implementation of trusted relations among external systems and architectures.
Assess and mitigate system security threats/risks throughout the program life cycle.
Contribute to the security planning, assessment, risk analysis, risk management, certification, and awareness activities for system and networking operations.
Review certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content.
Support security authorization activities in compliance with NSA/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes for security engineering designs.
Apply system security engineering expertise in one or more of the following to:
System security design process
Engineering life cycle
Information domain
Cross domain solutions
Commercial off-the-shelf and government off-the-shelf cryptography
Identification, authentication, and authorization
System integration
Risk management
Intrusion detection
Contingency planning
Incident handling
Configuration control
Change management, auditing, certification and accreditation process
Principles of IA (confidentiality, integrity, non repudiation, availability, and access control)
Security testing
Minimum Qualifications
A minimum of 7 years of experience as an Information System Security Engineer (ISSE) on programs and contracts of similar scope, type, and complexity is required.
Bachelor's degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required.
Note: Four (4) years of additional lSSE experience may be substituted for a Bachelor's degree.
DoD 8570.01-M compliance with IASAE Level2 is required.
A CISSP or CASP+ is required for this position.
Ability to perform the following job tasks
Participate as a security engineering representative on engineering teams for the design, development, implementation, and/or integration of secure networking, computing, and enclave environments.
Participate as a security engineering representative on engineering teams for the design, development, implementation, and/or integration of IA architectures, systems, or system components.
Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments.
Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components.
Support the Government in enforcing the design and implementation of trusted relationships among external systems and architectures.
Apply knowledge of lA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments.
Support security planning, assessment, risk analysis, and risk management.
Identify overall security requirements for the proper handling of Government data.
Interact with the customer and other project team members.
Perform system or network designs that encompass multiple enclaves, including those with differing data protection/classification requirements.
Provide security planning, assessment, risk analysis, and risk management.
Recommend system-level solutions to resolve security requirements.
Support the Government in enforcing the design and implementation of trusted relationships among external systems and architectures.
Clearance Requirement: This position requires an active TS/SCI with a polygraph. You must be a U.S. Citizen for consideration. Candidate Referral: Do you know someone who would be GREAT at this role? If you do, ARSIEM has a way for you to earn a bonus through our referral program for persons presenting NEW (not in our resume database) candidates who are successfully placed on one of our projects. The bonus for this position is $10,000, and the referrer is eligible to receive the sum for any applicant we are able to place within 12 months of referral. The bonus is paid after the referred employee reaches 6 months of employment.
ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.
Auto-ApplyInformation Systems Security Engineer Level 1
Columbia, MD
* Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of secure networking, computing, and enclave environments * Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of IA architectures, systems, or system components
* Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments
* Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments
* Interact with the customer and other project team members
* Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components
* Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures
* Support security planning, assessment, risk analysis, and risk management
* Identify overall security requirements for the proper handling of Government data