Information Systems Security Officer
Listed on 2026-02-14
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Network Security
Description
The Information System Security Officer (ISSO) provides comprehensive support to programs, organizations, systems, and enclaves in maintaining an effective information assurance and cybersecurity posture. This role ensures the implementation, coordination, and enforcement of information systems security policies, standards, and methodologies. The ISSO maintains the operational security posture of assigned systems, supports security authorization activities under NIST RMF, and assists in the daily security operations required to protect systems processing classified information.
Key Responsibilities- Support senior ISSOs in implementing and enforcing information systems security policies, standards, and methodologies.
- Propose, coordinate, and implement IT security programs, policies, and methodologies.
- Assist with preparation, development, and maintenance of cybersecurity documentation, including SSPs, SRTMs, C&A packages, and Risk Assessment Reports.
- Maintain operational cybersecurity posture for assigned systems, programs, or enclaves.
- Evaluate security solutions to ensure compliance with security requirements for processing classified information.
- Assist with configuration management (CM) of security-relevant software, hardware, and firmware.
- Manage and control system changes while assessing associated security impacts.
- Maintain records for workstations, servers, network devices, system upgrades, and security-relevant configuration changes.
- Develop and update system security plans and related cybersecurity documentation.
- Support the ISSM in maintaining the appropriate cybersecurity posture.
- Assist in managing system security aspects and performing daily security operations.
- Track and validate user identification and authentication mechanisms.
- Obtain and maintain system authorization for information systems under assigned purview.
- Provide oversight and direction to contractor ISSOs.
- Interact directly with customers, IT staff, and senior corporate leadership to achieve cybersecurity objectives.
- Conduct vulnerability and risk assessment analyses to support security authorization.
- Provide configuration management for information systems security software, hardware, and firmware.
- Support the implementation of security authorization activities in accordance with NIST Risk Management Framework (RMF).
- Experience:
Fifteen (15) years as an ISSO on programs and contracts of similar scope, type, and complexity. - Specialized
Experience:
At least three (3) of the following areas:- Current security tools
- Hardware/software security implementation
- Communication protocols
- Encryption techniques and tools
- Education:
Bachelor's degree in Computer Science or related discipline from an accredited institution. - Substitution:
Four (4) additional years of ISSO experience may replace the bachelor's degree. - Certification:
DoD 8570 IAM Level I compliance or higher required.
- U.S. Citizenship is required for all applicants. CTP is an equal opportunity employer and abides by applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph.
- Certification Requirements:
- DoD 8570 IAM Level I compliance or higher required.
This position requires an active Security Clearance with appropriate Polygraph.
About UsFounded in 2007, Columbia Technology Partners (CTP) is a Woman-Owned, Service-Disabled Veteran Owned Small Business with a specialization in technology and management consulting committed to solving intricate and sensitive technology issues facing corporations and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in information security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation, our employees have the experience, expertise, and innovative thinking our customers need for results that exceed expectations.
CTP staff have worked closely with both government engineers and management to gather mission requirements, develop the architecture to deliver the needed functionality and assess tools available to meet or exceed the needs of the mission.
At Columbia Technology Partners (CTP), we are united in being the best that we can be as individuals, but our core belief is that we can be better together. Together we will take on each mission with an execution process that authentically represents who we are. Our success relies on our team values, the foundation we built around them, and the Partners we become along the way.
That's why our pay is competitive, our missions are critical, and our benefits represent what matters most to CTP:
Our People.
At Columbia Technology Partners we are…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).