Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Senior Cybersecurity Specialist (ISSO Focus) image - Rise Careers
Job details

Senior Cybersecurity Specialist (ISSO Focus)

Location: Multiple DAF Bases (NCR and CONUS)

Job Category: Information Technology

Time Type: Full-time

Clearance Requirement: Current DoD Secret Clearance required

Security Suitability: Must be able to obtain and maintain a favorable background investigation

Employee Type: W2 and 1099 options available

Citizenship: US Citizen, no Dual Citizenship


NexThreat is seeking a Senior Cybersecurity Specialist with a focus on Information Systems Security Officer (ISSO) responsibilities to provide leadership and technical expertise for the Department of the Air Force (DAF) cybersecurity program at multiple DAF Bases. This role involves leading the implementation and maintenance of cybersecurity programs, mentoring junior staff, and acting as a subject matter expert in the Risk Management Framework (RMF) process. Experience with site surveys is highly preferred.


Key Responsibilities:

·      Lead the development, implementation, and maintenance of cybersecurity plans, policies, and procedures in accordance with DoD, DAF, and RMF requirements.

·      Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews [TSCM], TEMPEST countermeasure reviews, EMSEC).

·      Oversee the assessment and authorization (A&A) process for information systems, including documentation preparation, security control assessment, and risk mitigation.

·      Lead and conduct vulnerability scans and oversee the remediation of identified vulnerabilities.

·      Monitor security controls and system logs to identify potential security incidents and policy violations.

·      Lead and participate in incident response activities, including investigation, containment, eradication, and recovery.

·      Provide expert cybersecurity guidance and support to system owners, administrators, and users.

·      Maintain accurate and up-to-date records of system configurations, security documentation, and incident reports.

·      Collaborate with other cybersecurity personnel and stakeholders to ensure a consistent and effective security posture.

·      Lead cybersecurity meetings and interact with USG RMF personnel.

·      Lead and conduct site surveys to assess physical and environmental security controls.

·      Stay current with relevant cybersecurity regulations, policies, and best practices.

·      Mentor and train junior cybersecurity staff.

·      Serve as a technical point of contact and subject matter expert for ISSO-related matters.

·      Maintain COMSEC related documentation.

·      Develop corrective action plans, as needed.


Unique Skills/Tasks/Software:

·      Required: Expert-level experience with the DoD Risk Management Framework (RMF) process.

·      Preferred: Experience with tools such as ACAS, SCAP, eMASS, Xacta, Splunk, and Microsoft Sentinel.

·      In-depth understanding of NIST SP 800-series publications, particularly those related to risk management and security controls.


Preferred Certifications:

·      (ISC)² CISSP (Certified Information Systems Security Professional)

·      ISACA CISM (Certified Information Security Manager)

·      (ISC)² CAP (Certified Authorization Professional)

·      GIAC Security Leadership Certification (GSLC)


Qualifications:

·      Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field, or 8 years of relevant experience in lieu of a degree.

·      7 years of experience in cybersecurity, with a significant focus on ISSO responsibilities or similar roles.

·      Extensive experience with security control implementation, assessment, and documentation.

·      Proven leadership and mentoring skills.

·      Strong understanding of cybersecurity principles, practices, and technologies.

·      Experience with vulnerability management and incident response processes.

·      Excellent verbal and written communication skills.

·      Ability to work both independently and as part of a team.

·      Ability to obtain and maintain a Common Access Card (CAC).


NexThreat Glassdoor Company Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
NexThreat DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of NexThreat
NexThreat CEO photo
Unknown name
Approve of CEO

Average salary estimate

$105000 / YEARLY (est.)
min
max
$90000K
$120000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Senior Cybersecurity Specialist (ISSO Focus), NexThreat

NexThreat is on the lookout for a Senior Cybersecurity Specialist with a focus on Information Systems Security Officer (ISSO) responsibilities to join our team at Joint Base Elmendorf-Richardson, Alaska, and other DAF Bases across the country. In this full-time position, you'll get to flex your cybersecurity muscles, leading the implementation and maintenance of comprehensive cybersecurity programs in alignment with DoD and DAF standards. Your expertise will not only guide the cybersecurity initiatives but also mentor junior staff, elevating the team's overall performance. With a strong foundation in the Risk Management Framework (RMF), you’ll be hands-on with vulnerability assessments and remediation, while also playing a critical role in incident response activities. You can look forward to collaborating with system owners, conducting site surveys, and maintaining vital security documentation. The role also includes monitoring threat landscapes and ensuring compliance with the latest regulations and best practices. If you're passionate about cybersecurity and eager to develop your skills further while making an impact at the Department of the Air Force, this role is tailored for you. Join us at NexThreat where your talents will not only help protect systems but also mentor the next generation of cybersecurity experts.

Frequently Asked Questions (FAQs) for Senior Cybersecurity Specialist (ISSO Focus) Role at NexThreat
What are the primary responsibilities of a Senior Cybersecurity Specialist at NexThreat?

The primary responsibilities of a Senior Cybersecurity Specialist at NexThreat include leading the development and implementation of cybersecurity plans, conducting vulnerability assessments, managing security control assessments, and overseeing incident response activities. This role also requires mentoring junior staff and acting as a subject matter expert in the Risk Management Framework (RMF), ensuring compliance with DoD and DAF requirements while maintaining a proactive security posture.

Join Rise to see the full answer
What qualifications are needed for the Senior Cybersecurity Specialist position at NexThreat?

To qualify for the Senior Cybersecurity Specialist position at NexThreat, candidates should have a bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field, or have 8 years of relevant experience. Additionally, 7 years of cybersecurity experience with a strong focus on ISSO responsibilities is expected, alongside familiarity with vulnerability management processes and risk management best practices.

Join Rise to see the full answer
What certifications are preferred for the Senior Cybersecurity Specialist role at NexThreat?

Preferred certifications for the Senior Cybersecurity Specialist role at NexThreat include (ISC)² CISSP, ISACA CISM, (ISC)² CAP, and GIAC Security Leadership Certification (GSLC). These certifications demonstrate a candidate's expertise and commitment to the field of cybersecurity, particularly regarding information systems security and risk management.

Join Rise to see the full answer
What tools and software should a Senior Cybersecurity Specialist at NexThreat be familiar with?

A Senior Cybersecurity Specialist at NexThreat should ideally have expert-level experience with the DoD Risk Management Framework (RMF) process and be familiar with tools such as ACAS, SCAP, eMASS, Xacta, Splunk, and Microsoft Sentinel. Proficiency with these tools enhances the individual's ability to conduct security control assessments, vulnerability management, and incident response effectively.

Join Rise to see the full answer
What is the work environment like for a Senior Cybersecurity Specialist at NexThreat?

The work environment for a Senior Cybersecurity Specialist at NexThreat is dynamic and collaborative, involving both independent and team-oriented tasks. You’ll engage in hands-on activities related to cybersecurity assessments, vulnerability management, and mentoring junior staff while collaborating with other cybersecurity professionals. The position is located at Joint Base Elmendorf-Richardson, Alaska, providing a unique opportunity to support the cybersecurity framework for multiple DAF Bases.

Join Rise to see the full answer
Common Interview Questions for Senior Cybersecurity Specialist (ISSO Focus)
Can you explain your experience with the Risk Management Framework (RMF)?

In answering this question, highlight your hands-on experience with the RMF process, detailing specific projects where you've implemented or maintained RMF standards. Discuss your involvement in security assessments, documentation, and oversight of information system authorization processes, emphasizing how you’ve ensured compliance with regulations.

Join Rise to see the full answer
What methods do you use to conduct vulnerability assessments?

When responding, outline the systematic approach you use for vulnerability assessments, including tools you prefer (like ACAS or Splunk), the steps you take to conduct scans, analyze results, and develop remediation plans. Be sure to mention your ability to prioritize vulnerabilities based on risk assessment.

Join Rise to see the full answer
Describe your experience with incident response activities.

For this answer, provide specific examples of incidents you’ve managed, outlining the steps you took from detection through recovery. Discuss how you communicated with team members, documented incidents, and followed best practices to mitigate future risks.

Join Rise to see the full answer
How do you stay current with cybersecurity regulations and best practices?

In your response, emphasize your commitment to professional development, mentioning resources like training, certifications, cybersecurity forums, and conferences you attend. Highlight any subscriptions to leading cybersecurity publications or online courses that keep you informed.

Join Rise to see the full answer
What strategies do you use to mentor junior cybersecurity staff?

Discuss how you tailor your mentorship approach to individual needs, providing constructive feedback, conducting training sessions, and offering real-world scenario discussions. Highlight your focus on fostering a culture of learning and support within your team.

Join Rise to see the full answer
How do you handle conflicting security requirements from different stakeholders?

Describe your method for balancing stakeholder needs, emphasizing communication and collaboration. Talk about how you actively involve stakeholders in the decision-making process to reach a compromise that ensures security without hampering functionality.

Join Rise to see the full answer
Can you share an example of a significant challenge you've faced in cybersecurity and how you overcame it?

Provide a specific example of a challenge pertaining to vulnerability management or incident response. Detail the situation, your assessment process, the actions you took, and the overall outcome, illustrating your problem-solving skills and resilience.

Join Rise to see the full answer
What importance do you place on documentation in cybersecurity?

Express the vital role that documentation plays in cybersecurity, including compliance, communication, and historical analysis. Discuss your practices for maintaining accurate records of assessments, incidents, and policies to enhance organizational security posture.

Join Rise to see the full answer
How do you approach training and developing policies for cybersecurity?

In your answer, outline how you assess the current cybersecurity landscape and identify areas where training is required. Talk about the collaborative approach you take in formulating policies, ensuring they are practical and effective by incorporating feedback from team members.

Join Rise to see the full answer
What is your process for conducting site security surveys?

Detail the steps you take for conducting site surveys including planning, executing assessments of physical and environmental controls, documenting findings, and providing actionable recommendations. Highlight any tools or frameworks you utilize in the process to ensure thorough evaluations.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
NexThreat Hybrid Joint Base Elmendorf-Richardson, Alaska
Posted 5 days ago
Photo of the Rise User
Posted 2 days ago
CoStar Remote US-VA Arlington
Posted 28 minutes ago
Charles IT Remote No location specified
Posted 6 days ago
Photo of the Rise User
Posted 12 days ago
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
March 23, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!