Information Systems Security Officer; ISSO Level 3
Listed on 2025-11-27
-
IT/Tech
Cybersecurity, Information Security, Systems Administrator, Network Security
Information Systems Security Officer (ISSO) Level 3
Information Systems Security Officer Level 3
BTS Software Solutions is seeking an Information Systems Security Officerto execute the Information Assurance mission. This opportunity is for a future award expected in Oct 2025
Job DescriptionProvide support for a program, organization, system, or enclave’s information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system.
Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configuration management (CM) for information systems security software, hardware, and firmware. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
Support security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF).
- Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
- Assist with preparation and maintenance of documentation
- Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
- Assist with the CM for information system security software, hardware, and firmware
- Maintain records on workstations, servers, routers, firewalls, intelligent hubs , network switches, etc. to include system upgrades
- Propose, coordinate, implement, and enforce information systems security policies, standards, and methodologies
- Develop and maintain documentation for C&A in accordance with ODNI and DoD policies
- Provide CM for security-relevant information system software, hardware, and firmware
- Develop system security policy and ensures compliance
- Evaluate security solutions to ensure they meet security requirements for processing classified information
- Maintain operational security posture for an information system or program
- Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave
- Develop and update the system security plan and other IA documentation
- Assist with the management of security aspects of the information system and perform day today security operations of the system
- Administer the user identification and authentication mechanism of the Information System (JS)
- Obtain C&A for ISs under their purview
- Provide support for a program, organization, system, or enclave's information assurance program
- Plan and coordinate the IT security programs and policies
- Manage and control changes to the system and assess the security impact of those changes
- Serve as the Approval Authority for ISs under their control
- Provide daily oversight and direction to contractor ISSOs
- (U) Serve as an ISSM
- (U) Interact with customers, IT staff, and high-level corporate officers to define and achieve required IA objectives
Annapolis Junction, MD
Clearance RequirementTop Secret/SCI with Poly
Degree RequirementBachelor’s degree in computer science or related discipline from an accredited college or university is required.
Education and ExperienceTen (10) years of combined work-related experience in the fields of IT, cybersecurity or security authorization is required. Experience in several of the following areas is required: knowledge of current security tools, hardware/software security implementation; communication protocols; or encryption and encryption techniques/tools.…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).