About The Position

SAIC is seeking a hands-on Cybersecurity Information System Security Officer (ISSO) to support a program part-time (25%25) within the Department of War. This position focuses on leveraging Risk Management Framework (RMF), continuous monitoring, and cybersecurity best practices to ensure the security posture of the system and operations. The successful candidate will collaborate with cross-functional teams, execute vulnerability management, and provide guidance on security compliance using tools and methodologies aligned with contract requirements. This is a remote / work from home position approximately 10 hours per week.

Requirements

  • Bachelor’s degree in related discipline and eight (8) years or more experience. Four (4) additional years of related experience will be considered in lieu of a bachelor’s degree.
  • Experience performing security monitoring, risk assessments, and compliance checks.
  • Hands-on experience maintaining RMF packages and security documentation within tools like eMASS.
  • Demonstrated experience in vulnerability management, including analyzing scan results and overseeing remediations.
  • Familiarity with incident response coordination and audit log review processes.
  • Experience collaborating with CCBs and providing risk assessments related to system changes.
  • Experience working closely with ISSM and Systems Integration teams.
  • Must be CompTIA Security+ certified, prior to start date.
  • Active Secret Clearance

Responsibilities

  • Review audit logs and security alerts to detect and assess potential anomalies.
  • Conduct continuous monitoring tasks, including Configuration Control Board (CCB) impact reviews, patching recommendations, and ATO delta documentation.
  • Support vulnerability scanning efforts by reviewing scan reports, tracking mitigations, and documenting residual risks.
  • Assist in maintaining RMF documentation—such as System Security Plans (SSPs), Plan of Action and Milestones (POA&Ms), and archiving security artifacts in eMASS.
  • Review and assess access logs and user activity reports to identify and report potential inconsistencies or anomalies.
  • Use Jira for tracking cybersecurity and engineering activities facilitating continuous monitoring of security measures.
  • Serve as a bridge between Information System Security Manager (ISSM) and engineers.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service