Delegated Authorizing Official Representative, Level 3; FORECASTED
Fort Meade, Polk County, Florida, 33841, USA
Listed on 2026-01-10
-
IT/Tech
Cybersecurity, Systems Engineer
Location: Fort Meade
Independent Software is a consulting, product, and solutions firm dedicated to the practical application of software and system engineering technologies to solve complex problems. We bring together world‑class engineers with proven engineering best practices, domain expertise, commercial technologies, and proven agile management approaches to create high‑value solutions aimed at helping our customers meet their most critical business and mission objectives.
Why Independent Software?We focus on continual learning and evolution. We listen to our employees and adapt to the changing marketplace. We support training and certifications in emerging technologies that shape our customers’ missions. We are profitable year after year and always searching for great engineers who thrive in a culture with no red tape and no micromanagement. Smart people want to work with smart people, and we love people who are passionate about what they do and find ways to do it better.
TopReasons to Work at Independent Software
- Comprehensive healthcare coverage, generous leave time, and vendor discounts.
- Work‑life balance, with emphasis on leveraging the right tools for on‑site or remote work.
- Collaboration-friendly culture with open‑door policy.
- Support for causes employees care about.
- Fun employee and family events throughout the year.
- Company‑sponsored health, dental, and vision insurance; long‑term and short‑term disability; life insurance.
- Paid training for conferences, certifications, and seminars.
Company Sponsored Health, Dental and Vision Insurance Plans.
Company Paid Long Term Disability, Short Term Disability and Life Insurance.
Employee Assistance Program.
401(k) Profit‑Sharing Plan with immediate eligibility and company matching.
Agricous Paid Time Off and Holiday package.
What You Will Do
As a Delegated Authorizing Official (DAO) Representative, Level 3, you will support the identification, planning, and implementation of cybersecurity risk‑management efforts across enterprise systems. You will assess and ensure the secure integration of legacy and new systems, prepare risk documentation, and collaborate directly with stakeholders to meet security and compliance requirements. This role offers a meaningful opportunity to contribute to the cybersecurity posture of mission‑critical systems and build expertise in information assurance and system authorization processes.
- Perform security planning, assessment, risk analysis, and documentation.
- Conduct risk assessments for legacy system integration.
- Review and analyze security controls in operational systems.
- Identify security requirements and implement appropriate controls.
- Prepare and review authorization documentation, including Plans of Action and Milestones (POA&Ms).
- Ensure cybersecurity requirements are addressed in system development, configuration management, and risk processes.
- Contribute to security architecture and integration of cybersecurity into RDT&E and operational systems.
- Support configuration management to incorporate security measures in system updates.
- Collaborate with customers, IT staff, and executive stakeholders to define and achieve security and compliance objectives.
- Contribute to system acquisition planning with cybersecurity built in from the start.
Skills and Qualifications
- Experience in cybersecurity risk assessment, risk analysis, and risk management.
- Understanding of cybersecurity controls, infrastructure protection, and defensive IT strategies.
- Familiarity with system security engineering principles and documentation practices.
- Ability to analyze security architectures and assess system security controls.
- Strong interpersonal skills and experience interacting with technical teams, system owners, and senior leadership.
- Proficiency in preparing and reviewing documentation for system security authorization processes.
- Experience integrating cybersecurity into configuration and change management processes.
- Knowledge of defense‑in‑depth concepts, engineering lifecycle, and system security design.
- Information assurance principles (confidentiality, integrity, availability, non‑repudiation, access…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).