×
Register Here to Apply for Jobs or Post Jobs. X

Information Systems Security Officer; ISSO- Colorado Springs

Job in Denver, Denver County, Colorado, 80285, USA
Listing for: La Jolla Logic
Full Time position
Listed on 2026-02-07
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 100000 - 130000 USD Yearly USD 100000.00 130000.00 YEAR
Job Description & How to Apply Below
Position: Information Systems Security Officer (ISSO)- Colorado Springs, CO

Pay $100000.00 - $130000.00 / year

Employment type

Full-Time

Job Description
  • Req#: 2542700

La Jolla Logic is looking for a qualified Information Systems Security Officer (ISSO) to support the Cyber Team in the development and fielding of Defensive Cyber Operations capabilities for the US Space Force (Colorado Springs, CO) utilizing Dev Sec Ops  environments and lean agile practices in order to establish enterprise level safeguards such as computer and network systems security and cyber situational awareness, damage assessment and recovery, cyber threat recognition, attribution and mitigation, and active response methodologies across Enterprise Ground Services (EGS) in response to evolving threats and changes to cyber environment.

The program’s goal is to ensure delivery of critical infrastructure services and limit or contain the impact of a potential cybersecurity event and to protect the following mission sets:
Protected Communications, Missile Warning, Military Strategic Communications (MILSATCOM), Position Navigation and Timing (PNT), Ballistic Missile Command and Control, Space Domain Awareness (SDA), Nuclear Command Control and Communications (NC3), and Command and Control Satellite Operations (C2 Sat Ops).

Salary Range: $100,000-$130,000

Responsibilities
  • Advise senior management on risk levels and security posture.
  • Advise appropriate senior leadership or Authorizing Official of changes affecting the cybersecurity posture and/or Authority to Operate.
  • Collect and maintain data needed to meet system cybersecurity reporting.
  • Communicate as required the value of IT security throughout all levels of stakeholders.
  • Help ensure that security improvement actions are correctly evaluated, validated, and implemented as required.
  • Help ensure that cybersecurity inspections, tests, and reviews are coordinated for the system environment.
  • Help ensure that cybersecurity requirements are integrated into the continuity planning for the system/organization.
  • Evaluate and recommend approvals of development efforts to ensure that baseline security safeguards are appropriately installed.
  • Identify alternative information security strategies to address organizational security objectives.
  • Identify Information Technology (IT) security program implications of new technologies or technology upgrades.
  • Interpret patterns of noncompliance to determine their impact on levels of risk and/or overall effectiveness of the Enterprise’s cybersecurity program.
  • Manage the monitoring of information security data sources to maintain organizational situational awareness.
  • Participate in the information security training and awareness program.
  • Participate in an information security risk assessment during the Security Assessment and Authorization process.
  • Participate in the development or modification of the computer environment cybersecurity program plans and requirements.
  • Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of system operations.
  • Recognize a possible security violation and take appropriate action to report the incident, as required.
  • Recommend resource allocations required to securely operate and maintain the organizations cybersecurity requirements.
  • Assist in overseeing policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.
  • Help ensure that plans of action and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
  • Support necessary compliance activities.
  • Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.
Requirements
  • Bachelor’s degree in related field is highly desired (Computer Science, Engineering, Information Systems, etc.)
  • 4+ years of relevant experience
  • Active Secret security clearance: U.S. Citizenship is required.
  • DoD 8570 Certification (Security+ or equivalent required, CISSP desired).
  • Experience with IAVMs, DISA STIGs, POA&Ms, and related Federal/DoD policies and regulations.
  • Experience with the security authorization process including the review of system security…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary