Cybersecurity ISSO; Journeyman
Listed on 2026-02-07
-
IT/Tech
Cybersecurity, IT Consultant
Torch Technologies has an exciting opportunity for a Cybersecurity Engineer (ISSO) located in Kettering, OH (Dayton/WPAFB area) to support our EPASS GB contract. As part of the AFLCMC/GB Business and Enterprise Systems Directorate (BES), the Digital Enterprise Solutions (DES) program conducts strategy and innovation planning activities to support the functional community when performing IT-focused capability-based planning and requirements development for PEO BES Defense Business System (DBS) initiatives.
Early acquisition activities include requirements analysis; concept development; trade space evaluation; cost estimating; identification of technology maturity, risk drivers, needs, and opportunities; product support; and acquisition life cycle planning.
The successful candidate will provide the PMO/Capability Development Manager (CDM) cybersecurity support per DoDI 8500.01. Support includes assessing and continuously monitoring cybersecurity risk ensuring that legacy and new capabilities adhere to enterprise standards such as Risk Management Framework (RMF), Cybersecurity Framework (CSF), and National Institute of Standards and Technology (NIST) and per Authorization Official’s Information System’s Continuous Monitoring (ISCM) strategy.
This position requires a highly motivated cybersecurity ISSO professional who is responsible for ensuring the appropriate operational security posture is maintained for the assigned IT. This includes the following related to maintaining situational awareness and initiating actions to improve or restore cybersecurity posture:
- Implements and enforces all AF cybersecurity policies, procedures, and countermeasures.
- Completes and maintains required cybersecurity certification IAW AFMAN 17-1303.
- Ensures all users have the requisite security clearances and need-to-know, complete annual cybersecurity training, and are aware of their responsibilities before being granted access to the IT according to AFMAN 17-1301.
- Maintains all authorized user access control documentation IAW the applicable AF Records Information Management System.
- Ensures software, hardware, and firmware complies with appropriate security configuration guidelines, e.g., security technical implementation guides/security requirement guides.
- Ensures proper configuration management procedures are followed prior to implementation and contingent upon necessary approval.
- Coordinates changes or modifications with the system-level ISSM, SCA, and/or the Wing Cybersecurity office.
- Initiates protective or corrective measures, in coordination with the ISSM, when a security incident or vulnerability is discovered.
- Reports security incidents or vulnerabilities to the system-level ISSM and wing cybersecurity office according to AFI 17-203, Cyber Incident Handling.
- Initiates exceptions, deviations, or waivers to cybersecurity requirements.
The Information Systems Security Officer (ISSO) has the knowledge, experience, and demonstrated ability to perform tasks related to the technical/professional discipline they are performing. Typically works independently and applies the proper procedures and processes related to their area of expertise. Has the ability to problem solve and troubleshoot various situations to develop successful outcomes within established program/project guidelines. Work is performed independently or under the oversight of more senior contractor employees (Program Office and Staff Level Support interface).
All Cybersecurity professionals should possess experience providing guidance on the following to include, but not limited to:
- Access control.
- Configuration management.
- System and communications protection.
- Contingency planning.
- Incident handling.
- System and information integrity.
- Security and privacy training and awareness.
- Software development activities, software and tools related to Cybersecurity.
- Experience performing cybersecurity duties as outlined in DoDI 8500.01, AFI 17-130, and AFI 17-1301 for assigned AF IT.
- Experience validating, evaluating, and analyzing finding results and developer adjudications using automated testing tools, e.g., Fortify, Checkmarx, Sonar Qube, and App Scan.
- Experience utilizing DoD…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).