Information System Security Officer

DraperCambridge, MA
$75,000 - $156,000Onsite

About The Position

The Information System Security Officer 1 (ISSO) supports the continuous monitoring and authorization efforts of multiple classified information systems under the direction of the Information System Security Manager (ISSM). Performing a variety of technical, and non-technical Cyber Security functions.

Requirements

  • Requires a bachelor's degree in Information Technology or a related field.
  • Equivalent industry experience may be substituted.
  • Ability to acquire an IAM I/IAT II Certification within 6 months of start date.
  • 1-3 years year relevant industry experience is required
  • Understanding of information security concepts (e.g. RMF, DIACAP)
  • Awareness of audit technologies or capabilities (e.g. Splunk, event viewer)
  • Understands Information Technology basics.
  • Awareness of network type designations (e.g. WAN, LAN) and associated infrastructure (e.g. Servers, switches, firewalls).
  • Applicants selected for this position will be required to obtain and maintain a government security clearance.
  • Current in scope Top Secret security clearance is required.

Nice To Haves

  • Preferred experience with RMF (NIST SP 800-53, JSIG, DAAG, ICD 503), IR, Vulnerability Management, SCAP, STIG, and Security-Relevant Tools.

Responsibilities

  • Assist the ISSM in meeting their duties and responsibilities. The ISSO shall assume ISSM responsibilities in the absence of the ISSM.
  • Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package.
  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
  • Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS.
  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
  • Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization.
  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
  • With supervision, Conduct Audits and Continuous Monitoring (ConMon) activities using available technical and non-technical processes, Reports Audit and ConMon findings, Conduct incident response steps as directed.
  • With supervision, manage configuration baselines of both hardware and software, Identify system architecture flaws using industry standard tools (e.g. STIG, SCAP, Nessus) that will be flowed to the ISSM for review.
  • Performs other duties as assigned.

Benefits

  • workplace flexibility
  • employee clubs ranging from photography to yoga
  • health and finance workshops
  • off site social events
  • discounts to local museums and cultural activities
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service