×
Register Here to Apply for Jobs or Post Jobs. X

Information System Security Officer; ISSO

Job in Bethesda, Montgomery County, Maryland, 20811, USA
Listing for: Lawelawe Defense Inc.
Full Time position
Listed on 2026-02-18
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 100000 - 130000 USD Yearly USD 100000.00 130000.00 YEAR
Job Description & How to Apply Below
Position: Information System Security Officer (ISSO)

Lawelawe is a Native Hawaiian Owned Small Disadvantaged Business (NHO SDB) that specializes in providing a range of services to federal government clients, including program management, digital solutions, human capital and training. Lawelawe leverages our NHO status to secure federal contracts that not only drive business success but also support our overall mission to uplift economically disadvantaged Native Hawaiian families and preserve the Native Hawaiian heritage.

You Are

An experienced Information System Security Officer (ISSO) with a laser focus on protecting sensitive systems and ensuring regulatory compliance in high-stakes environments. You thrive on solving complex security challenges, translating policies into actionable security procedures. You are agile and strategic while managing daily security operations, responding to incidents under pressure, and contributing to long-term cybersecurity planning.

How You Will Make an Impact

You’ll serve as a key security authority and trusted advisor, helping secure sensitive systems and fortify the network from evolving threats. Shaping and enforcing

Information Assurance policies, supporting ATO processes from start to finish, ensuing the operation of vulnerability management programs.

Responsibilities
  • Participate in various aspects in developing and writing certification and accreditation (C&A) documentation packages included in the process of helping an organization/agency obtain an Authority to Operate (ATO) on its systems and/or environment.
  • Follow National Institute of Standards and Technology (NIST) and/or Department of Defense IA Certification and Accreditation Process standards in performance of job functions.
  • Manageor takepart in the MTF Information Assurance Vulnerability Management (IAVM) program, which requires disseminating, coordinating, validating, reviewing, guiding, data entry, training, and monitoring compliance data provided or available to/from DoD and MHS.
  • UseDoD and MHS approved vulnerability assessment and mitigation tools to identify vulnerabilities, apply mitigation, and to identify potential areas of weaknesses in the IA programs.
  • Identify security problems and requirements through studies, analysis, and research.
  • Responsible for disseminating information, policies, procedures, and/or guidance to superior and subordinate units and for the management of tasks and requirements for MTF.
  • Respondto reported security breaches, violations of rules, regulations, policies, procedures, and codes of conduct and takes appropriate action to minimize harm, investigate, evaluate, track, and report incidents.
  • Managethe security of the information system that is slated for Certification & Accreditation (C&A).
  • Support the information system owner/information owner for the completion of security-related responsibilities.
  • Advise system changes and impact.
  • Provide view on the continuous monitoring of the information system.
  • Assess security events to determine impact, develop and execute corrective action plans, and make recommendations to management for corrective long-term preventive solutions to avoid recurrence.
  • Monitor and audits installed software and hardware tools for signs of suspicious activity leading to potential security events.
  • Responsible for the implementation, maintenance, and proliferation of new technologies meant to enhance the overall network security posture.
  • Develop and implements technical programs to ensure that users adhere to systems security policies and procedures.
  • Ensure access to computer applications, operating systems, and other stored programs and data is limited to those personnel authorized for such access.
  • Reviewand design systems software routines to facilitate security processes.
  • Works with other Information Technology (IT) Specialists and participates in operational teams.
  • Assign work to team members, tracks work completion, and assesses effectiveness and efficiency of work performed.
  • Assist with customer ticketing system assignments and meets SLA
  • Elevate difficult assignments to senior IA managers as needed.
  • May be required to respond to support nights or weekends to fulfill department related duties or be required to be placed on…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary