Information Systems Security Officer
Columbus
Thursday, 07 May 2026
Join a team of communications and systems engineers supporting engineering, sustainment, and management of communications systems. Perform ongoing system analysis activities for programs. Perform risk assessments of systems and equipment, assist engineers with identifying solutions for vulnerabilities, create and map Security Technical Implementation Guides (STIGs), submit change requests for system components, develop a Plan of Action and Milestones (POA&M), create documentation supporting Risk Management Framework (RMF) accreditations, perform vulnerability management using automated systems, and create and submit RMF packages. Brief the technical security posture to client leadership, prepare brief slides and summaries of vulnerabilities, and advise on how to prevent and mitigate future security threats. Develop relationships quickly and easily with other teams, communicating the complexities of security with a wide variety of audiences, including senior management. Implement infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. Perform risk and vulnerability assessments in network, system, and application areas. Leverage big data analytics and traditional security event types to identify advanced threats or indicators of compromise. You Have: 5 years of experience with information assurance or cybersecurity. Experience serving as an Information Systems Security Officer (ISSO)Experience managing and administering Assured Compliance Assessment Solution (ACAS) and Host-Based Security System (HBSS)Experience utilizing the Enterprise Mission Assurance Support Service (e. MASS) to address security controls, create POA&Ms, and upload artifacts such as STIG checklists or ACAS scans. Experience supporting system security and authorization processes. Experience reviewing vulnerability documentation and writing Residual Risk statements. Experience reporting IT security events or incidents based on policies and procedures. Knowledge of Microsoft Defender for Endpoint (MDE)Secret clearance. HS diploma or GED - Nice If You Have: Knowledge of Cloud-based infrastructure and Dev. Sec. Ops principles and practices. Ability to use and operate security tools, including Tenable Nessus, Security. Center, IBM Guardium, HP Web. Inspect, or Network Mapper. Bachelor's degree in Information Technology. Clearance:Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Secret clearance is required. Compensation.