×
Register Here to Apply for Jobs or Post Jobs. X

Information Systems Security Officer

Job in Alexandria, Fairfax County, Virginia, 22350, USA
Listing for: Booz Allen Hamilton
Full Time position
Listed on 2025-12-01
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, IT Consultant
Job Description & How to Apply Below

Your growth matters to us - explore our career development opportunities.

BE EMPOWERED TO SUCCEED

Connect with others in our people-first culture and enhance our collective ingenuity.

SUPPORT YOUR WELLBEING

Learn how we’ll support you as you pursue a balanced, fulfilling life.

YOUR CANDIDATE JOURNEY

Discover what to expect during your journey as candidate with us.

Cyber threats are everywhere, and the constantly evolving nature of these threats can make understanding them seem overwhelming to Department of Defense (DoD) agencies and related components. In all of this “cyber noise,” how can these organizations understand their risks and how to mitigate them? The answer is an Information Systems Security Officer (ISSO) like you who will break down complex threats into manageable plans of action.

As an ISSO on our team, you will use your experience to work with government stakeholders and a cloud-based application and platform development team to identify cyber risks, understand applicable policies, and develop a mitigation plan. You’ll review technical, environmental, and personnel details from security engineers, platform and application developers, and enterprise architects to assess the entire threat landscape. You will coordinate with product delivery teams to ensure their products meet DoD cybersecurity standards and support a larger cyber team to collectively guide your client through a plan of action with presentations, documentation, and milestones.

You will work with your client to translate security concepts so they can make the best decisions to secure cloud infrastructure, artificial intelligence (AI) solutions, containerized applications, CI/CD application pipelines, and sensitive data repositories. You will conduct risk assessments, considering data confidentiality, integrity, and availability. You will be involved in organized Incident Response actions such as consulting, guiding, and reporting back to key stakeholders.

You will support the team in meeting authorization timelines and coordinating communications with external entities in support of that objective.

This is your opportunity to act as an information security subject matter expert while broadening your skills in AWS, AI or ML, containerization, CI/CD, Agile development, Dev Sec Ops , risk management, and data security. Work with us as we protect the DoD’s critical analytic capabilities.

Information Systems Security Officer

The Opportunity:

Cyber threats are everywhere, and the constantly evolving nature of these threats can make understanding them seem overwhelming to Department of Defense (DoD) agencies and related components. In all of this “cyber noise,” how can these organizations understand their risks and how to mitigate them? The answer is an Information Systems Security Officer (ISSO) like you who will break down complex threats into manageable plans of action.

  • 5+ years of experience implementing risk management methodologies contained in best practice documentation such as NIST SP 800-30, SP 800-53, SP 800-128, SP 800-160, SP 800-171, or CIS benchmarks in support of system security configurations, practices, and oversight
  • 3+ years of experience providing cybersecurity leadership in an ISSO capacity, interfacing with internal and external SMEs such as PMs, Cyber Assessors, and AOs
  • Experience with control implementations associated with RMF, FedRAMP, ICD 503, and DoD Information Levels, including applying them to the design and implementation of IT solutions to achieve system authorizations
  • Experience implementing and maintaining security controls within AWS cloud, containerized, CI/CD pipeline, and Agile development environments
  • Experience developing and reviewing ATO authorization packages in Xacta or eMASS
  • Experience analyzing compliance and vulnerability scan results and implementing appropriate mitigations
  • Experience performing audit log reviews to detect anomalous behavior in information systems and networks and overseeing continuous monitoring activities
  • Active TS/SCI clearance; willingness to take a polygraph exam
  • Bachelor’s degree
  • CGRC, CAP, CASP+, CCSP, Cloud+, SSCP, Security+, or GSEC Certification
Nice If You Have:
  • Exper…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary