Information Systems Security Officer
Listed on 2026-02-19
-
IT/Tech
Cybersecurity, Systems Administrator
About Pratt Miller, An Oshkosh Company
Pratt Miller is a product development company in motorsports, defense, and mobility industries providing clients with product engineering and low-volume production solutions. Our range of research & development, engineering, prototype manufacturing, test & validation, and low-rate production capability help our customers bring their high-quality products to market faster.
The Information Systems Security Officer (ISSO) is responsible for ensuring the appropriate operational security posture is maintained for an information system and works in close collaboration with the ISSM. The position should have the detailed knowledge and expertise required to manage the environment for information systems and be responsible for day-to-day security and monitoring for uptime and critical errors. This will include physical and environmental protection, incident handling, and system support.
The role will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation, including developing and updating the authorization documentation, implementing configuration management across authorization boundaries, assessing the security impact of those changes, and making recommendations to the ISSM. The position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
The role will also support information technology special projects and required systems that are dedicated to those projects, including but not limited to hypervisor, application, network, support, and general troubleshooting.
PLEASE NOTE THIS POSITION IS ONSITE IN NEW HUDSON, MI
Essential Functions and SkillsTypical responsibilities include, but are not limited to:
- Providing day-to-day operational support and troubleshooting for the application and infrastructure environment through system upgrades and performance management.
- Work on supporting a VDI environment (Citrix VMware/Nutanix), including deploying new hardware, supporting overall health of environment, and supporting virtual workstations and servers.
- Ensure appropriate operational security posture is maintained for an information system.
- Assist the ISSM in meeting duties and responsibilities.
- Prepare, review, and update authorization packages. Notify ISSM when changes occur that might affect the authorization determination of the information system(s).
- Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
- Coordinate incident response activities with ISSM and Cybersecurity teams.
- Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
- Identify cyber security vulnerabilities and assist with the implementation of patches or mitigations for them.
- Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
- Monitor system recovery processes to ensure security features and procedures are properly restored and function correctly.
- Configuration, certification, and auditing/analysis of Windows/Linux operating systems in Peer-to-peer, LAN, and WAN network environments.
- Strong documentation skills for configurations, compliance evidence, and SOPs.
- Foundational understanding of network, operating systems, servers, security, and application management lifecycle.
- Execute the orchestration of job processing to enhance system performance.
- Ability to clearly explain complex security concepts to both technical and non-technical audiences.
- Collaborative and communicative, with consistent effectiveness working across disciplines.
- Be able to implement and maintain NIST 800-53 and NIST 800-171 controls in an environment.
- Auditing experience within the context of meeting government or defense compliance.
- Be able to run and understand security vulnerability reports and act on those to secure the environment appropriately.
- Experience with Windows workstation/server operating systems, Linux operating systems, and hypervisors.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).