Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Information Systems Security Officer (ISSO) image - Rise Careers
Job details

Information Systems Security Officer (ISSO)

ISSO

Employment Type: Full-Time, Experienced 

Department: Information Technology 


CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you’ll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.  


CGS brings motivated, highly skilled, and creative people together to solve the government’s most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities. 


Skills and attributes for success:

- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. 

- Maintain responsibility for managing cybersecurity risk from an organizational perspective. 

- Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.

- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.

- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).

- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.

- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.

- Provide subject matter expertise for cyber security and trusted system technology. 

- Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.

- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. 

- Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.

- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems. 


Qualifications:

- Bachelor’s Degree.

- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.

- eMASS experience.

- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.

- Strong desktop publishing skills using Microsoft Word and Excel.

- Experience with industry writing styles such as grammar, sentence form, and structure.

- Ability to multi-task in a deadline-oriented environment.


Ideally, you will also have:

- CISSP, CASP, or a similar certificate is preferred.

- Master's Degree in Cybersecurity or related field.

- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.

- Demonstrated ability to work well independently and as a part of a team.

- Excellent work ethic and a high commitment to quality.


Our Commitment:

Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client’s specific needs. We are committed to solving the most challenging and dynamic problems.


For the past seven years, we’ve been growing our government contracting portfolio, and along the way, we’ve created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.


Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.


We care about our employees. Therefore, we offer a comprehensive benefits package.

Health, Dental, and Vision

Life Insurance

401k

Flexible Spending Account (Health, Dependent Care, and Commuter)

Paid Time Off and Observance of State/Federal Holidays


Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.


Join our team and become part of government innovation!

Explore additional job opportunities with CGS on our Job Board:

https://cgsfederal.com/join-our-team/

For more information about CGS please visit: https://www.cgsfederal.com or contact:

Email: info@cgsfederal.com


$92,213.33 - $125,146.66 a year

Average salary estimate

$108679.5 / YEARLY (est.)
min
max
$92213K
$125146K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Information Systems Security Officer (ISSO), Contact Government Services, LLC

Join CGS as an Information Systems Security Officer (ISSO) and become an integral part of our team dedicated to safeguarding information systems for the Department of Commerce. This full-time position requires your expertise in security assessment documentation to ensure systems achieve their Authorization to Operate (ATO). You will conduct detailed security assessments in line with NIST 800.53, following the Risk Management Framework (RMF) process. If you're passionate about identifying security weaknesses and recommending improvements, this job offers opportunities to maintain cybersecurity risk across the organization. You'll collaborate with various teams, providing security guidance and managing vulnerabilities while documenting your upgrades and findings. With a commitment to professional growth, CGS provides a supportive environment that'll enable you to make impactful contributions to government innovation. If you have a minimum of five years experience in roles such as an Information Assurance Analyst or a similar position, let’s work together to tackle dynamic challenges utilizing your advanced technical skills and expertise in cybersecurity.

Frequently Asked Questions (FAQs) for Information Systems Security Officer (ISSO) Role at Contact Government Services, LLC
What are the responsibilities of the Information Systems Security Officer (ISSO) at CGS?

The Information Systems Security Officer (ISSO) at CGS is responsible for conducting security assessments, managing risks, providing security guidance, and supporting authorization activities, ensuring that systems comply with security standards and protocols set by NIST and the Department of Commerce.

Join Rise to see the full answer
What qualifications are required for the ISSO position at CGS?

Candidates for the ISSO position at CGS must have a Bachelor’s degree, a minimum of five years experience in information assurance roles, and relevant security certifications. Experience with eMASS and strong writing skills are also essential for producing comprehensive security documentation.

Join Rise to see the full answer
What skills does CGS look for in an ISSO candidate?

CGS seeks candidates with excellent analytical thinking, detail orientation, strong organizational skills, and the ability to work both independently and collaboratively. Proficiency in Microsoft Word and Excel, along with experience in cybersecurity compliance and risk management, is highly desirable.

Join Rise to see the full answer
What technologies does an ISSO at CGS work with?

As an ISSO at CGS, you will work with various technologies, including vulnerability scanning tools like HBSS or ACAS, and patch management systems like IAVM, to ensure compliance and maintain the integrity of information systems.

Join Rise to see the full answer
What are the benefits of working as an ISSO at CGS?

Working as an ISSO at CGS comes with a comprehensive benefits package that includes health, dental, and vision insurance, 401k plans, flexible spending accounts, paid time off, and a commitment to a supportive workplace dedicated to your professional growth.

Join Rise to see the full answer
Common Interview Questions for Information Systems Security Officer (ISSO)
Can you explain the Risk Management Framework (RMF) process?

The RMF process involves six steps: categorization, selection, implementation, assessment, authorization, and continuous monitoring. Understanding each step is crucial for the ISSO role as it ensures compliance and security of information systems.

Join Rise to see the full answer
What tools and techniques do you use for vulnerability management?

I utilize tools like HBSS and ACAS for vulnerability scanning, alongside implementing patch management strategies. Staying current with vulnerabilities and applying mitigative strategies is essential.

Join Rise to see the full answer
Describe your experience with security documentation.

In my previous role, I regularly generated security documentation, including ATO packages and assessment reports, ensuring compliance with NIST standards while addressing organization-specific security needs.

Join Rise to see the full answer
How do you prioritize cybersecurity risks?

I assess risks based on their potential impact and likelihood, maintaining a risk registry to document and present these findings to senior leadership, enabling informed decision-making.

Join Rise to see the full answer
What role does communication play in your job as an ISSO?

Effective communication is vital for an ISSO as it involves collaborating with different teams, explaining security needs, and translating technical requirements into actionable strategies for stakeholders.

Join Rise to see the full answer
Can you discuss your experience with NIST 800.53 controls?

Yes, I have worked extensively with NIST 800.53 controls, implementing the necessary security and privacy measures while conducting assessments to ensure compliance across various information systems.

Join Rise to see the full answer
How do you stay updated with emerging cybersecurity threats?

I regularly attend workshops, participate in online training, and engage with cybersecurity communities to stay abreast of emerging threats and best practices in the field.

Join Rise to see the full answer
What strategies do you use for incident response planning?

I adopt a proactive approach by developing incident response plans that include clearly defined roles, communication protocols, and recovery strategies to minimize damage during an incident.

Join Rise to see the full answer
How do you handle competing priorities in a deadline-oriented environment?

I prioritize tasks based on deadlines and impact, using project management tools to keep track of progress and delegation when necessary to ensure all objectives are met.

Join Rise to see the full answer
Why is teamwork important in the ISSO role?

Teamwork is crucial for successfully managing diverse cybersecurity threats. Collaboration facilitates knowledge sharing and allows for comprehensive risk assessments and effective solution implementation.

Join Rise to see the full answer
Similar Jobs
Posted 4 days ago
Photo of the Rise User
Posted 6 days ago
MAT Holdings, Inc Hybrid 6700 Wildlife Wy, Long Grove, IL 60047, USA
Posted 2 days ago
Posted 2 days ago
Photo of the Rise User
Posted 3 days ago
Photo of the Rise User
Posted 8 days ago
Inclusive & Diverse
Mission Driven
Empathetic
Collaboration over Competition
Transparent & Candid
Growth & Learning
Customer-Centric
Medical Insurance
Dental Insurance
Vision Insurance
Health Savings Account (HSA)
Mental Health Resources
Equity
Maternity Leave
Paternity Leave
Paid Time-Off
Life insurance
Posted 13 days ago
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
January 5, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!