Information Systems Security Officer Skill Level 3
Job in
Clinton, Prince George's County, Maryland, 20735, USA
Listed on 2026-02-12
Listing for:
Medium
Full Time
position Listed on 2026-02-12
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Network Security
Job Description & How to Apply Below
Prime Time Consulting, a GRVTY Company, provides clients with expert intelligence analysis services. Our clients include defense contractors, industrial and service corporations, and departments and agencies of the U.S. Federal Government.
We are actively searching for Information Systems Security Officer Skill Level 3, located in Maryland
, to support our team. We have varying levels of this position, depending on years of experience and education.
Job Duties
- Provide support for a program, organization, system, or enclave’s information assurance program. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day security operations of the system.
Evaluate security solutions to ensure they meet security requirements for processing classified information. Perform vulnerability/risk assessment analysis to support security authorization. Provide configuration management (CM) for information systems security SW, HW, and FW. Manage changes to system and assess the security impact of those changes. Prepare and review documentation to include SSPs, Risk Assessment Reports, C&A packages, and System Requirements Traceability Matrices (SRTMs).
Support security authorization activities in compliance with NIST RMF.
- Provide support to senior ISSOs for implementing, and enforcing information systems security policies, standards, and methodologies
- Assist with preparation and maintenance of documentation
- Assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information
- Assist with Configuration Management (CM) for information system security SW, HW, and FW
- Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc. to include system upgrades
- Propose, coordinate, and implement information systems security policies, standards, and methodologies
- Develop and maintain documentation for Security Authorization in accordance with ODNI and DoD policies
- Provide CM for security-relevant information system SW, HW, and FW
- Ensure compliance with system security policy
- Evaluate security solutions to ensure they meet security requirements for processing classified information
- Maintain operational security posture for an information system or program
- Provide support to the ISSM for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave
- Develop and update the system security plan and other Cybersecurity documentation
- Assist with the management of security aspects of the information system and perform day-to- day security operations of the system
- Track and ensure appropriate user identification and authentication mechanism of the Information System
- Obtain system authorization for ISs under their purview
- Provide support for a program, organization, system, or enclave’s information assurance program
- Plan and coordinate implementation of IT security programs and policies
- Manage and control changes to the system assessing the security impact of those changes
- Provide daily oversight and direction to contractor ISSOs
- Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives
- 10 years of combined work-relative experience in the fields of IT, cybersecurity or security authorization is required. Experience in several of the following areas is required: knowledge of current security tools, HW/SW security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
- Bachelor’s degree in Computer Science or a related…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×