Information System Security Officer

Booz Allen HamiltonFort Richardson, AK
$77,600 - $176,000Remote

About The Position

Information System Security Officer The Opportunity: Your combination of people skills and system administrator expertise makes you the team hero, solving one problem after another. What if you could use those skills to improve the technology supporting the Army? We’re looking for an Information System Security Officer (ISSO) to provide full lifecycle support to risk management and analysis on intelligence networks and systems to help us and our customers identify capability gaps, threats, and vulnerabilities and provide other technical support as required. As an ISSO on our project, you’ll rely on cybersecurity and Information Assurance (IA) background to be a technical leader and support Enterprise activities and Booz Allen customers throughout multiple classified computing domains. You will assume responsibility for ensuring all Information System Security policies, standards, and directives are enforced to support assessment, authorization, and continued operation of information systems processing classified information. You will define security expectations, drive the remediation of vulnerabilities, and collaborate across multidisciplinary teams to ensure systems remain authorized, protected, and mission ready. You’ll provide your customers with insight into their network through monitoring and performance management. Your ISSO or SYSAD expertise will be vital as you identify problem areas and opportunities for improvement in a mission-critical network. You’ll help your team better understand the network by turning metrics into information and explaining their meaning.

Requirements

  • 3+ years of experience as an ISSO supporting Information Assurance Technical (IAT) or Information Assurance Management (IAM) activities
  • Experience integrating MI Systems with other warfighting functions such as Fires, Mission Command, Signal, or Electronic Warfare on multiple classification networks
  • Experience developing technological responses with recommendations to prevent, reduce, detect, and respond to cyberspace threats
  • Ability to conduct research and analysis of actionable cyberspace threats requiring a rapid response and assess information security for classified activities
  • Ability to conduct research and assessments to develop and update system security outlining security operating procedures
  • Ability to provide NE and Computer Environment (CE) support
  • Active TS/SCI clearance; willingness to take a polygraph exam
  • HS diploma or GED and 9+ years of experience in a professional work environment, Associate’s degree and 7+ years of experience in a professional work environment, or Bachelor's degree and 3+ years of experience in a professional work environment
  • IAM Level I or Level II Certification

Nice To Haves

  • Experience as an ISSM, ISSE, or SCA supporting classified programs
  • Experience completing certification and accreditation packages and requirements via the Enterprise Mission Assurance Support Service (eMASS) system for RMF documentation submission
  • Ability to perform security inspections, validate clearances, and perform certifications and cyber awareness training
  • Ability to assist with the issuance of Public Key Infrastructures (PKIs)
  • Ability to prepare Body of Evidence for Authorization or Assessment activities to receive Approval to Connect or Operate
  • Certified Authorization Professional (CAP), CompTIA Advanced Security Practitioner (CASP+), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), GIAC Security Leadership Certification (GSLC), Security+, GIAC Security Essentials (GSEC), or Cisco Certified Network Associate (CCNA-Security) Certification

Responsibilities

  • Pay special attention to intrusion detection, find and fix unprotected vulnerabilities, and ensure that remote access points are well secured.
  • Analyze systems to establish and manage accreditation for all information systems and equipment operating within a classified environment.
  • Research and analyze Risk Management Framework (RMF) to make RMF certification recommendations to Enterprise.
  • Conduct information security assessments and analysis in accordance with all procedures, policies, guidelines, and regulations.
  • Develop and implement system information security standards and procedures.
  • Focus on threats and vulnerabilities and improvement of security of systems.
  • Create Cybersecurity, System Engineering, and Design and Integration Reports.
  • Provide logistics, procurement, and lifecycle services.
  • Provide technical expertise to support receipt, storage, handling, inventory, deployment, and disposal of property.

Benefits

  • health
  • life
  • disability
  • financial
  • retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
  • recognition awards program
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service