Information System Security Officer; ISSO
Listed on 2026-02-18
-
IT/Tech
Cybersecurity, Information Security
Lawelawe is a Native Hawaiian Owned Small Disadvantaged Business (NHO SDB) that specializes in providing a range of services to federal government clients, including program management, digital solutions, human capital and training. Lawelawe leverages our NHO status to secure federal contracts that not only drive business success but also support our overall mission to uplift economically disadvantaged Native Hawaiian families and preserve the Native Hawaiian heritage.
You Are
An experienced Information System Security Officer (ISSO) with a laser focus on protecting sensitive systems and ensuring regulatory compliance in high-stakes environments. You thrive on solving complex security challenges, translating policies into actionable security procedures. You are agile and strategic while managing daily security operations, responding to incidents under pressure, and contributing to long-term cybersecurity planning.
How You Will Make an ImpactYou’ll serve as a key security authority and trusted advisor, helping secure sensitive systems and fortify the network from evolving threats. Shaping and enforcing
Information Assurance policies, supporting ATO processes from start to finish, ensuing the operation of vulnerability management programs.
- Participate in various aspects in developing and writing certification and accreditation (C&A) documentation packages included in the process of helping an organization/agency obtain an Authority to Operate (ATO) on its systems and/or environment.
- Follow National Institute of Standards and Technology (NIST) and/or Department of Defense IA Certification and Accreditation Process standards in performance of job functions.
- Manageor takepart in the MTF Information Assurance Vulnerability Management (IAVM) program, which requires disseminating, coordinating, validating, reviewing, guiding, data entry, training, and monitoring compliance data provided or available to/from DoD and MHS.
- UseDoD and MHS approved vulnerability assessment and mitigation tools to identify vulnerabilities, apply mitigation, and to identify potential areas of weaknesses in the IA programs.
- Identify security problems and requirements through studies, analysis, and research.
- Responsible for disseminating information, policies, procedures, and/or guidance to superior and subordinate units and for the management of tasks and requirements for MTF.
- Respondto reported security breaches, violations of rules, regulations, policies, procedures, and codes of conduct and takes appropriate action to minimize harm, investigate, evaluate, track, and report incidents.
- Managethe security of the information system that is slated for Certification & Accreditation (C&A).
- Support the information system owner/information owner for the completion of security-related responsibilities.
- Advise system changes and impact.
- Provide view on the continuous monitoring of the information system.
- Assess security events to determine impact, develop and execute corrective action plans, and make recommendations to management for corrective long-term preventive solutions to avoid recurrence.
- Monitor and audits installed software and hardware tools for signs of suspicious activity leading to potential security events.
- Responsible for the implementation, maintenance, and proliferation of new technologies meant to enhance the overall network security posture.
- Develop and implements technical programs to ensure that users adhere to systems security policies and procedures.
- Ensure access to computer applications, operating systems, and other stored programs and data is limited to those personnel authorized for such access.
- Reviewand design systems software routines to facilitate security processes.
- Works with other Information Technology (IT) Specialists and participates in operational teams.
- Assign work to team members, tracks work completion, and assesses effectiveness and efficiency of work performed.
- Assist with customer ticketing system assignments and meets SLA
- Elevate difficult assignments to senior IA managers as needed.
- May be required to respond to support nights or weekends to fulfill department related duties or be required to be placed on…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).