- UpvoteDownvoteShare Job
- Suggest Revision
Provide the Authorizing Official (AO) and Program-Information Systems Security Manager (P-ISSM) support of the Risk Management Framework (RMF) Assessment and Authorization (A&A) efforts for the Army Intelligence Enterprise.
Full-timeExpandUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist the security team (ISSM/ISSO) to mitigate identified vulnerabilities and provide audit results for security incidents. Cloud Administrator in support of a classified Intelligence Community Managed Service Provider (MSP) contract that delivers network services to over 400 Industry Partner Subscriber locations.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Prior performance in roles such as ISSO or ISSM. KEYWORDS: RMF, Risk Management Framework, ICD, Information Assurance, IA, IAO, IAT, IAM, A&A, A+, Network+, Security+, Non-classified Internet Protocol Router Network (NIPRNet), Secret Internet Protocol Router Network (SIPRNet), DISA Security Technical Implementation Guides (STIGs), CISSP, CASP.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SKILLS & ABILITIES: Prior performance in the role of ISSO, ISSE, ISSM, SCA or Cybersecurity Analyst. The Cyber Security Engineer will provide the services necessary to provide Assessment & Authorization support, cyber security authorizations process support, continuous monitoring support, Continuity Planning/Disaster Recovery (DR) process support, and Information System Security Officer (ISSO) support.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist the System Owner, Information Owner, Component Privacy Officer and Information System Security Manager (ISSM) in recording all known security weaknesses of assigned information systems in the Plans of Action and Milestones (POA&M’s) in accordance with DOT policy, guides and procedures.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will also advise the ISSM and other program stakeholders regarding A&A cybersecurity matters to include change control, Information Assurance Vulnerability Management (IAVM), EXORD's, FRAGO's, DoD and DoN policies.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In-depth knowledge of cybersecurity principles, ISSM/ISSO responsibilities, RMF processes, and proficiency in using eMASS is essential. In-depth knowledge of cybersecurity principles, ISSM/ISSO responsibilities, RMF processes, and proficiency in using eMASS is essential.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement the Defense (DOD) Risk Management Framework (RMF) and assist to the System Security Manager (ISSM) ensure successful implementation of associated security controls and reviews all RMF documentation packages, and system fielding, operations, or upgrade requirements.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Prior performance in the role of ISSO and ISSM or SCA. Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support ISSO/ISSM with Assessment and Authorization (A&A) requirements and drafting/updating security related RMF documentation. Work with ISSO/ISSM to close assigned POA&Ms. Ad hoc duties assigned by ISSM.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate with the ISSM & ISSO to ensure the DevSecOps system maintains compliance with the clients authority to operate across NIPR, SIPR, and JWICS. Coordinate with the ISSM & ISSO to ensure the DevSecOps system maintains compliance with the clients authority to operate across NIPR, SIPR, and JWICS.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave. CNHV's capabilities, market–relevant service offerings, past performance credentials, and diverse status allow government clients to engage quickly and confidently with CNHV. Core service areas for CNHV include Health & Medical Services, Unexploded Ordnance (UXO), Surface & Underwater Range Clearance, Explosive Ordnance Disposal (EOD), Executive Briefing Teams, Training, Exercise Support, Computer Facilities, and Emergency Management Services.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provider of automated software testing, data analysis, and cybersecurity solutions for complex, mission-critical systems in the US Department of Defense (DOD), is seeking an Information System Security Manager (ISSM) to support its Arlington, VA office.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least two (2) years working as or supporting, an ISSO or ISSM. Familiarity with Splunk, Symantec Endpoint Protection, Tenable Security Center, IBM BigFix and IDS/IPS tools, and Sonarqube. We are seeking a Mid-Level Cyber Security Analyst in support of a critical Law Enforcement customer.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This role requires a Security Compliance Analyst to provide ISSO and A&A support services resulting in system ATOs and continuous monitoring. Capgemini Government Solutions (CGS) LLC is seeking a highly motivated Senior Security Compliance Analyst/ISSO to join our team in the Washington, D.C. metro to support our government clients.
ExpandApply NowActive JobUpdated 5 days ago
issm job in Alexandria, VA
FEATURED BLOG POSTS
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.