Information Systems Security Officer II (ISSO II)

SYSTEM HIGH CORPORATIONWarner Robins, GA
Onsite

About The Position

The Information Systems Security Officer (ISSO) is responsible for ensuring the appropriate operational security posture is maintained for an information system. This role involves close collaboration with the Information System Security Manager (ISSM) and Information System Owner (ISO), requiring detailed knowledge and expertise to manage the security aspects and day-to-day security operations of a system. Responsibilities also encompass physical and environmental protection, personnel security, incident handling, and security training and awareness. The ISSO will work closely with the ISSM and ISO to monitor information systems and their operating environments, including developing and updating authorization documentation and implementing configuration management across authorization boundaries. This includes assessing the security impact of changes and making recommendations to the ISSM. The primary function of this position is to work within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD), and Military Compartments efforts. The role provides day-to-day support for Collateral, Sensitive Compartmented Information (SCI), and Special Access Program (SAP) activities.

Requirements

  • 2 - 5 years related experience
  • Prior performance in roles such as System, Network Administrator or ISSO
  • Bachelor’s degree or equivalent experience (4 years)
  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire
  • Current Top-Secret Clearance with SCI Eligibility
  • Eligibility for access to Special Access Program Information
  • Willingness to submit to a Counterintelligence polygraph
  • Must be able to regularly lift up to 50 lbs.

Responsibilities

  • Assist the ISSM in meeting their duties and responsibilities
  • Prepare, review, and update authorization packages
  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package
  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals
  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)
  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
  • Prepare reports on the status of security safeguards applied to computer systems
  • Perform ISSO duties in support of in-house and external customers
  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service