The Senior Information System Security Officer (ISSO) supports a large, complex software development program encompassing software development and maintenance, IT infrastructure support (network, workstation, and server), systems integration, enterprise application development, network engineering, and information systems security. In this role, the ISSO works closely with other security professionals to develop and implement strategies that detect and mitigate threats, protect critical data, and assess system and network vulnerabilities. The ISSO is responsible for implementing and enforcing information systems security policies, standards, and methodologies to ensure compliance with organizational and regulatory requirements. This includes evaluating security solutions to verify they meet security requirements for processing various types of information and supporting configuration management of security-relevant software, hardware, and firmware. The role also involves analyzing threats, developing best practices for incident detection and reporting, and leading efforts in vulnerability remediation. Additionally, the ISSO maintains the operational security posture of information systems by managing system records across infrastructure components such as workstations, servers, routers, firewalls, and network devices, including tracking system upgrades and changes. The position supports the Information System Security Manager (ISSM) in maintaining appropriate information assurance (IA) posture across systems, programs, or enclaves. The ISSO develops and maintains Certification and Accreditation (C&A) documentation in accordance with applicable policies, including system security plans and related artifacts. The role also supports Information Assurance Vulnerability Alert (IAVA) management activities, including initiating responses, conducting system scans, implementing remediation actions, and deploying patches and security updates. In addition, the ISSO contributes to the development of system security policies, ensures compliance across systems, and administers user identification and authentication mechanisms to safeguard access to information systems.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
1-10 employees