×
Register Here to Apply for Jobs or Post Jobs. X

Information System Security Engineer; ISSE III - Hybrid Security Clearance

Job in Philadelphia, Philadelphia County, Pennsylvania, 19112, USA
Listing for: ISHPI Information Technologies, Inc.
Full Time position
Listed on 2025-10-19
Job specializations:
  • IT/Tech
    Cybersecurity, IT Support, Systems Administrator, Network Security
Job Description & How to Apply Below
Position: Information System Security Engineer (ISSE) III - Hybrid with Security Clearance
Overview Ishpi Information Technologies, Inc. (DBA ISHPI) is passionate about providing our customers with technical solutions that satisfy their business needs. Through collaborative interactions with customers, team members, subject matter experts (SMEs), technical leaders, and partners we design practical solutions that solve real problems for major government and business organizations. As a member of our group, you will work with a team focused on delivering innovative business solutions using emerging technologies through proven successful methods.

Responsibilities The ISSE III will provide support to the Naval Surface Warfare Command in Philadelphia, PA. S hall provide cybersecurity support for the Code 104 Information Technology Operations Division in the area of Information System Security Engineer ( ISSE ) support. These duties include but are not limited to:
* Assessment & Authorization (A&A)
* Cybersecurity Compliance and Audit Readiness
* Information Assurance Vulnerability Management (IAVM)
* Vulnerability Scanning and Remediation
* Application and Implementation of Security Technical Implementation Guides (STIGs) and Security Requirements Guide (SRGs) Shall assist with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments (PIA), and Plans of Action and Milestones (POA&M).

* Execute the RMF process in support of obtaining and maintaining Interim Authority to Test (IATT), AO approval, Authorization to Operate (ATO), and Denial of Authorization to Operate (DATO).
* Identify and tailor IT and CS security control baselines based on RMF guidelines and categorization of the RMF boundary
* Perform Ports, Protocols, and Services Management (PPSM).
* Perform IT and CS vulnerability-level risk assessments.
* Execute security control testing as required by a risk assessment or annual security review (ASR).
* Mitigate and remediate IT and CS system level vulnerabilities for all assets withing the boundary per STIG requirements
* Develop and maintain Plans of Actions and Milestones (POA&M) in Enterprise Mission Assurance Support Service ( eMASS ).
* Develop and maintain system level IT and CS policies and procedures for respective RMF boundaries and/or guidance provided by the command ISSMs
* Implement and assess STIG and SRGs.
* Perform and develop vulnerability assessments with automated tools such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Check (SCC) and Evaluate STIG.
* Deploy security updates to Information System components.
* Perform routine audits of IT system hardware and software components.
* Maintain inventory of Information System components.
* Participate in IT change control and configuration management processes.
* Upload vulnerability data in Vulnerability Remediation Asset Manager (VRAM).
* Image or re-image assets that are part of the assigned RMF boundary
* Install software and troubleshoot software issues as necessary to support compliance of the RMF boundaries' assets.
* Assist with removal of SSD, HDD or other critical components of assets before destruction and removal from the RMF boundary .
* Provide cybersecurity patching of assets in times of DoD and DoN TASKORDs, FRAGORDs, or even designated by Command ISSM, ACIO, and/or Code 104 management.
* Support configuration change documentation and control processes and maintaining DOD STIG Compliance.
* Support cyber compliance of assets that are part of an enterprise IT network to include Windows server and CISCO networking hardware. This includes assessing vulnerabilities, patching and meeting requirements of the STIG for the hardware.
* Report compliance issues of network hardware to management as not cause an operational of the network. Qualifications

Education:

Bachelor's degree in Computer…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary