×
Register Here to Apply for Jobs or Post Jobs. X

Senior Information Systems Security Engineer; ISSE

Job in Colorado Springs, El Paso County, Colorado, 80509, USA
Listing for: Parsons
Full Time position
Listed on 2026-01-06
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Job Description & How to Apply Below
Position: Senior Information Systems Security Engineer (ISSE)

In a world of possibilities, pursue one with endless opportunities. Imagine Next!

At Parsons, you can imagine a career where you thrive, work with exceptional people, and be yourself. Guided by our leadership vision of valuing people, embracing agility, and fostering growth, we cultivate an innovative culture that empowers you to achieve your full potential. Unleash your talent and redefine what’s possible.

Job Description

Parsons has emerged as a leader in the development of cutting‑edge solutions for the Department of Defense and Intelligence Community. Our tremendous success can be attributed to our people and our priorities. We hire the best; we make them a priority, and we never lose focus on the mission. It’s why we’re here. We have built this cultural legacy by working closely with analysts and operators to understand their needs and deliver meaningful value through innovative, cost effective and intuitive software solutions.

Our Space Operations Program Directorate is passionate about making America the undisputed leader in Space because we understand that ensuring our nation’s security for future generations depends on it. Parsons creates game changing space solutions by teaming highly respected subject matter experts with brilliant technologists. Do you want to be part of a team that is helping the government solve major national security challenges in the space domain?

We need your help.

Our team is looking for a Senior Information Systems Security Officer (ISSO) . In this role you will get to focus on the cybersecurity aspects of system design to deal with cyber‑related disruptions, minimizing misuse and malicious behavior, while supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.

The position will provide “day‑to‑day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.

Required Skills
  • Utilize Joint Special Access Program Implementation Guide (JSIG) /Risk Management Framework (RMF) to achieve and maintain Authorization to Operate (ATO), Interim Authorization to Test (IATT), and Authority to Connect (ATC) for all existing and new Information Systems (IS) that require accreditation to include on premise and cloud platforms

  • Broad knowledge of Information Technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption); computer networking concepts and protocols, and network security methodologies; network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense‑in‑depth)

  • Implement security policies and procedures including System Security Plans (SSP), Security Controls Traceability Matrices (SCTM), Risk Assessment Reports (RAR), Continuous Monitoring Plans (Con Mon), Security Assessment Reports (SAR), and Plan of Actions and Milestones (POA&M)

  • Strong ability to produce and maintain varied technical documentation, policy, and procedures such as:
    Ports Protocols and Services Management (PPSM) worksheets, system and network diagrams / descriptions, and Standard Operating Procedures (SOPs)

  • Coordinate and perform security audits and system updates to identify nonstandard events and maintain system and information integrity

  • Play an active role in conducting continuous monitoring activities on Accredited Information Systems (AIS) environment of operation to include developing and updating the system artifacts as well as managing and controlling changes to the system

  • Conduct security impact analysis activities and provide to the Information Systems Security Manager (ISSM) on all configuration management changes to the authorization boundaries

  • Experience in reviewing and implementing secure configuration management techniques

  • Report Cyber incidents or vulnerabilities to the ISSM and/or government chain of command

  • Have expert knowledge of and hands on experience to configure and manage security tools and systems e.g., Security Technical Implementation Guides (STIGs), Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS) / Trellix /…

Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary