Information System Security Officer; ISSO
Listed on 2026-01-01
-
IT/Tech
Cybersecurity, Information Security
Location: Laurel
Description
Do you love to be on a team of highly skilled, motivated and dedicated professionals charged with protecting sensitive data while administering enterprise Information Systems (IS) that support the Johns Hopkins University Applied Physic Lab (JHUAPL) mission?
Do you want to integrate system administration with Information Security (IS) across Highly Classified networks?
Are you passionate about protecting our Nation’s most sensitive information?
If so, we're looking for someone like you to join our team at APL.
We are seeking a dedicated Information System Security Officer (ISSO) to help us protect APL's Sponsor classified enterprise information technology infrastructure.
As a member of our team, you'll contribute to IS Security Management and oversight of our classified information systems in support of Sponsor/Program needs. You'll join an impressive team of technical specialists motivated by the common goal of supporting APL’s operational security posture across a complex classified infrastructure. You will independently identify and solve technical issues relating to Information Assurance system hardening (ensuring system availability, integrity, authentication and confidentiality).
As an ISSO...
- Your primary responsibilities are aligned to supporting requirements found in the Defense Counterintelligence and Security Agency Assessment and Authorization Process Manual (DAAPM) version 2.2 and future updates to include: security relevant documentation such as security CONOPS, Security Controls Traceability Matrix's, System Security Plans, Risk Assessment Reports, Contingency Plans.
- Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security plan.
- Ensure all proper account management documentation is completed prior to adding and deleting system accounts.
- Verify all system security documentation is current and accessible to properly authorized individuals.
- Conduct periodic assessments of authorized systems and providing the ISSM with corrective actions for all identified findings and vulnerabilities.
- Ensure audit records are collected and analyzed in accordance with the security plan.
- Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
- Serve as a member of the Configuration Control Board (CCB).
- Possess sufficient experience and technical competence commensurate with the complexity of the systems.
- Ensure user activity monitoring data is analyzed, stored, and protected in accordance with the ITPSO policies and procedures.
- Execute the continuous monitoring strategy.
- Perform and analyze weekly security audits for nonstandard events. Implement backup solution and ensure a cohesive disaster recovery plan.
- Utilize the Enterprise Mission Assurance Support Services (eMASS) accreditation workflow platform.
- Assist in preparations for and participate in system inspections and take timely action to correct and document any issues or findings and train IS users on items required to eliminate security incidents.
You meet our minimum qualifications for the job if you
- A minimum of 6 years’ experience implementing cybersecurity policy and security controls for classified enterprise information technology systems and have a worked with a Restricted Area, SCIF, or SAPF.
- Possess a Bachelor’s degree in Information Technology, Cybersecurity, Computer Science, Information Systems, Data Science, or Software Engineering from an ABET accredited or NCAE-C-designated institution.
- Meet and demonstrate intermediate DoD Cyberspace Workforce Qualification and Management Program requirements through training and/or certifications (Security+, equivalent, or higher).
- Have a strong working knowledge with the DCSA DAAPM or JSIG, NISPOM, and DISA cybersecurity policy to support risk-based decisions and ensure compliance across the enterprise.
- Managed, trained, and led System Administrators (SAs), Information System Owners (ISOs), Information System Security Officers (ISSOs), and other stakeholders to prepare for and meet DCSA DAAPM standards and Defense Information System Agency…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).