Senior Information Systems Security Engineer; ISSE
Listed on 2026-01-06
-
IT/Tech
Cybersecurity, Information Security
In a world of possibilities, pursue one with endless opportunities. Imagine Next!
At Parsons, you can imagine a career where you thrive, work with exceptional people, and be yourself. Guided by our leadership vision of valuing people, embracing agility, and fostering growth, we cultivate an innovative culture that empowers you to achieve your full potential. Unleash your talent and redefine what’s possible.
Job DescriptionParsons has emerged as a leader in the development of cutting‑edge solutions for the Department of Defense and Intelligence Community. Our tremendous success can be attributed to our people and our priorities. We hire the best; we make them a priority, and we never lose focus on the mission. It’s why we’re here. We have built this cultural legacy by working closely with analysts and operators to understand their needs and deliver meaningful value through innovative, cost effective and intuitive software solutions.
Our Space Operations Program Directorate is passionate about making America the undisputed leader in Space because we understand that ensuring our nation’s security for future generations depends on it. Parsons creates game changing space solutions by teaming highly respected subject matter experts with brilliant technologists. Do you want to be part of a team that is helping the government solve major national security challenges in the space domain?
We need your help.
Our team is looking for a Senior Information Systems Security Officer (ISSO) . In this role you will get to focus on the cybersecurity aspects of system design to deal with cyber‑related disruptions, minimizing misuse and malicious behavior, while supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.
The position will provide “day‑to‑day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Utilize Joint Special Access Program Implementation Guide (JSIG) /Risk Management Framework (RMF) to achieve and maintain Authorization to Operate (ATO), Interim Authorization to Test (IATT), and Authority to Connect (ATC) for all existing and new Information Systems (IS) that require accreditation to include on premise and cloud platforms
Broad knowledge of Information Technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption); computer networking concepts and protocols, and network security methodologies; network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense‑in‑depth)
Implement security policies and procedures including System Security Plans (SSP), Security Controls Traceability Matrices (SCTM), Risk Assessment Reports (RAR), Continuous Monitoring Plans (Con Mon), Security Assessment Reports (SAR), and Plan of Actions and Milestones (POA&M)
Strong ability to produce and maintain varied technical documentation, policy, and procedures such as:
Ports Protocols and Services Management (PPSM) worksheets, system and network diagrams / descriptions, and Standard Operating Procedures (SOPs)Coordinate and perform security audits and system updates to identify nonstandard events and maintain system and information integrity
Play an active role in conducting continuous monitoring activities on Accredited Information Systems (AIS) environment of operation to include developing and updating the system artifacts as well as managing and controlling changes to the system
Conduct security impact analysis activities and provide to the Information Systems Security Manager (ISSM) on all configuration management changes to the authorization boundaries
Experience in reviewing and implementing secure configuration management techniques
Report Cyber incidents or vulnerabilities to the ISSM and/or government chain of command
Have expert knowledge of and hands on experience to configure and manage security tools and systems e.g., Security Technical Implementation Guides (STIGs), Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS) / Trellix /…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).