Information Systems Security Officer; ISSO \u2013 Skill Level 3 Security Clearance
Job in
Annapolis Junction, Howard County, Maryland, 20701, USA
Listed on 2026-02-13
Listing for:
Kaizen Approach, Inc
Full Time
position Listed on 2026-02-13
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Network Security
Job Description & How to Apply Below
Location: Annapolis Junction
Kaizen Approach is currently seeking an Information Systems Security Officer (ISSO) to provide support for a program, organization, system, or enclave's information assurance program. In this role, the ISSO will support proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies while maintaining the operational security posture of information systems or programs. The position involves assisting with management of security aspects of information systems, performing day-to-day security operations, evaluating security solutions for processing classified information, and conducting vulnerability and risk assessment activities to support security authorization.
The ISSO will provide configuration management for information systems security software, hardware, and firmware, manage system changes, and assess the security impact of those changes. This role also includes preparing and reviewing security documentation such as System Security Plans, Risk Assessment Reports, Certification and Accreditation packages, and System Requirements Traceability Matrices, and supporting security authorization activities in compliance with the NIST Risk Management Framework.
Requirements:
* Must have the ability to provide support for a program, organization, system, or enclave's information assurance program, including supporting senior Information Systems Security Officers and the Information System Security Manager in proposing, coordinating, implementing, enforcing, and ensuring compliance with information systems security policies, standards, and methodologies, while maintaining the appropriate operational Cybersecurity posture.
* Must possess the ability to assist with the management of security aspects of information systems, perform day-to-day security operations, maintain the operational security posture of systems or programs, and obtain system authorization for information systems under assigned purview.
* Must be capable of developing, preparing, maintaining, and updating System Security Plans and other Cybersecurity documentation, including documentation required for Security Authorization in accordance with ODNI and DoD policies.
* Must have the ability to evaluate and assist in the evaluation of security solutions to ensure they meet security requirements for processing classified information and to support security authorization activities.
* Must possess the ability to provide configuration management for security-relevant information system software, hardware, and firmware; assist with configuration management activities; manage and control system changes; assess the security impact of those changes; and maintain records for workstations, servers, routers, firewalls, intelligent hubs, network switches, and system upgrades.
* Must be capable of planning and coordinating the implementation of information technology security programs and policies, tracking and ensuring appropriate user identification and authentication mechanisms for information systems, and ensuring ongoing compliance with system security policy.
* Must have the ability to provide daily oversight and direction to contractor Information Systems Security Officers and to interact with customers, information technology staff, and high-level corporate officers to define and achieve required Cybersecurity objectives.
* Must have ten years of combined work-related experience in the fields of information technology, cybersecurity, or security authorization, or fourteen years of combined work-related experience if no bachelor's degree is held, including experience with current security tools, hardware and software security implementation, communication protocols, or encryption tools and techniques, and familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
* Must have a bachelor's degree in Computer Science, Cyber Security, or IT Engineering, or four additional years of work-related experience may be substituted for the degree, and must be DoD 8570 compliant with IAM I.
* Active TS/SCI clearance with Polygraph is required. Salary Range: A variety of factors can impact the final salary offered, including, but not limited to, geographic location, Federal Government contract labor categories and wage rates, relevant work experience, specialized skills and competencies, education, and certifications. About Kaizen Approach At Kaizen Approach, we truly care about our team, offering flexibility for a balanced life, competitive compensation, and a robust benefits package that supports you and your family.
We prioritize well-being with premium healthcare, financial and family support, retirement planning, and ongoing learning. With 4 weeks of PTO, 11 holidays, gifted 401k, profit sharing, and paid training, we're committed to your growth and happiness-both at work and beyond! Kaizen Approach is an Equal…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×