Information Systems Security Officer III (ISSO III)

SYSTEM HIGH CORPORATIONEdinburg, TX
6hOnsite

About The Position

At System High Corporation—a Top Washington-Area Workplace (The Washington Post, 2023–2025), a Top Workplaces Culture Excellence honoree (April 2025), and a three-time VETS Indexes 3-Star Employer—we protect and advance the nation’s most critical missions. As part of our team, you’ll tackle complex security challenges across SAP, SCI, and Collateral programs. If you’re driven by national security, innovation, and integrity, we want to hear from you. System High Corporation delivers the most advanced protection and secrecy solutions to secure and strengthen critical missions, programs, operations, and intelligence activities. We are seeking an Information Systems Security Manager (ISSM) II to help contribute to our success and help us solve problems with innovation through intelligence. The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Departments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.

Requirements

  • 5 - 7 years related experience
  • Prior performance in roles such as System, Network Administrator or ISSO
  • Bachelor’s degree OR Associate’s degree in a related area + 2 years’ experience OR equivalent experience (4 years)
  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.
  • Current Top Secret Clearance with SCI Eligibility
  • Eligibility for access to Special Access Program Information
  • Willingness to submit to a Counterintelligence polygraph
  • Must be able to regularly lift up to 50 lbs.
  • This position requires a TS/SCI Clearance and a minimum of two years of Special Access Program Experience

Responsibilities

  • Develop physical or logical topologies for a system
  • Assist the ISSM in meeting their duties and responsibilities
  • Prepare, review, and update authorization packages
  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package
  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals
  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)
  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
  • Prepare reports on the status of security safeguards applied to computer systems
  • Perform ISSO duties in support of in-house and external customers
  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
  • Conduct continuous monitoring activities for authorization boundaries under your preview
  • Assist Department of Defense, National Agency and Contractor organizations with all RMF efforts
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service