×
Register Here to Apply for Jobs or Post Jobs. X

Specialist, Information System Security; ISSO

Job in Colorado Springs, El Paso County, Colorado, 80509, USA
Listing for: L3Harris
Full Time position
Listed on 2025-12-28
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, Systems Administrator, IT Support
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Specialist, Information System Security (ISSO)

L3

Harris is dedicated to recruiting and developing high‑performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers’ mission and quest for professional growth. L3

Harris provides an inclusive, engaging environment designed to empower employees and promote work‑life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do.

L3

Harris Technologies is the Trusted Disruptor in the defense industry. With customers’ mission‑critical needs always in mind, our employees deliver end‑to‑end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security.

Job Title: Specialist, Cyber Intelligence (ISSO)

Job Code: 32184

Job Location: Colorado Springs, CO

Job Schedule: 9/80 – Off Every Other Friday

Job Description: L3

Harris is seeking an Information System Security Officer (ISSO) to support the Space Superiority & Imaging division’s customers and programs. The ISSO will perform information system security activities under the guidance and oversight of the Information System Security Manager (ISSM) on assigned information systems. The ISSO will be knowledgeable in information technology and information assurance standards and regulations. Responsibilities include, but are not limited to, performing security control assessments and continuous monitoring, conducting configuration and vulnerability scanning and remediation, authoring and maintaining documentation and artifacts (body of evidence) in support of the Assessment and Authorization (A&A) of information systems following the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), remediating security control deficiencies, assessing and approving change requests for assigned information systems, performing user training and user account management oversight, and investigating and responding to security incidents and violations.

Essential Functions:

  • Perform Continuous Monitoring of assigned information systems to include user activity monitoring (auditing) using SIEM tools or the native audit reduction capability of the operating system
  • Conduct security control assessments
  • Initiate, review, and remediate vulnerability and compliance scans using industry approved scanning tools (Nessus, ACAS)
  • Review and assess the configuration settings of assigned information systems against the DISA STIG configuration standards
  • Developing and updating documentation in support of obtaining or maintaining an Authority to Operate (ATO) for assigned information systems
  • Attend Change Control Boards (CCB) to review and approved information system change requests
  • Conduct and monitor security awareness training for information system users
  • Respond to, and investigate, security incidents and violations

Qualifications:

  • Active Secret security clearance
  • Bachelor’s Degree and minimum 4 years of prior relevant experience, or Graduate Degree and a minimum of 2 years of prior related experience. In lieu of a degree, minimum of 8 years of prior related experience.

Preferred Additional

Skills:

  • DoD 8570 IAM III certification
  • Experience as an ISSO/ISSM supporting classified systems under the JSIG, ICD 503, and/or 32 CFR Part 117 Section 18
  • Experience as an ISSO/ISSM supporting NIPRNet and/or SIPRNet systems
  • Experience hardening information systems and/or performing configuration/vulnerability assessments against the DISA STIG standards
  • Experience auditing information system and user activity using SIEM tools like Splunk, and/or Log Insight
  • Experience utilizing command line interfaces (CLI) and Linux/Unix commands to operate/support systems
  • Experience scanning information systems using Nessus and/or ACAS
  • Experience with A&A databases like eMASS and/or Xacta
  • Experience performing RMF A&A activities and system accreditation
  • Experience developing policies and procedures to implement security controls and customer requirements.
  • Experience developing Plans of Action & Milestones (POA&M) to document and mitigate security control deficiencies.

In compliance with pay transparency requirements,…

To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary