Information Systems Security Officer

Columbus

Thursday, 07 May 2026

Join a team of communications and systems engineers supporting engineering, sustainment, and management of communications systems. Perform ongoing system analysis activities for programs. Perform risk assessments of systems and equipment, assist engineers with identifying solutions for vulnerabilities, create and map Security Technical Implementation Guides (STIGs), submit change requests for system components, develop a Plan of Action and Milestones (POA&M), create documentation supporting Risk Management Framework (RMF) accreditations, perform vulnerability management using automated systems, and create and submit RMF packages. Brief the technical security posture to client leadership, prepare brief slides and summaries of vulnerabilities, and advise on how to prevent and mitigate future security threats. Develop relationships quickly and easily with other teams, communicating the complexities of security with a wide variety of audiences, including senior management. Implement infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. Perform risk and vulnerability assessments in network, system, and application areas. Leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise. You Have: 5 years of experience with information assurance or cybersecurity. Experience serving as an Information Systems Security Officer (ISSO)Experience managing and administering Assured Compliance Assessment Solution (ACAS) and Host-Based Security System (HBSS)Experience utilizing the Enterprise Mission Assurance Support Service (e. MASS) to address security controls, create POA&Ms, and upload artifacts such as STIG checklists or ACAS scans. Experience supporting system security and authorization processes. Experience reviewing vulnerability documentation and writing Residual Risk statements. Experience reporting IT security events or incidents based on policies and procedures. Knowledge of Microsoft Defender for Endpoint (MDE)Secret clearance. HS diploma or GED - Nice If You Have: Knowledge of Cloud-based infrastructure and Dev. Sec. Ops principles and practices. Ability to use and operate security tools, including Tenable Nessus, Security. Center, IBM Guardium, HP Web. Inspect, or Network Mapper. Bachelor's degree in Information Technology. Clearance:Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Secret clearance is required. Compensation.

apply
 
Loading Similar Jobs...
JOBZ is an independent Job Search Engine. JOBZ is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. JOBZ uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, job descriptions and other company descriptions / details are the property of their respective holder. JOBZ does not have its users apply for a job on the J-O-B-Z.com website. Additionally, JOBZ may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.