Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy, and consent to receive emails from Rise
Jobs / Job page
Information Systems Security Officer (ISSO) image - Rise Careers
Job details

Information Systems Security Officer (ISSO)

Type of Requisition:

Regular

Clearance Level Must Currently Possess:

Top Secret/SCI

Clearance Level Must Be Able to Obtain:

Top Secret/SCI

Public Trust/Other Required:

None

Job Family:

Information Security

Job Qualifications:

Skills:

Information Systems, Information System Security, Security Education

Certifications:

None

Experience:

4 + years of related experience

US Citizenship Required:

Yes

Job Description:

Join our technology leading team of men and women that solve some of the world’s most complex technical challenges. GDIT is seeking an Information Systems Security Officer (ISSO) to join our team in support of the Intelligence, Surveillance, and Reconnaissance (ISR) mission of the Air Force at Langley AFB, VA.

The ISSO supports the Air Forces’ Distributed Common Ground System (DCGS) services across a global enterprise environment. 

Information System Security Officer (ISSO)

  • Validate configuration changes of firewall, switch, and router modifications on a continuous basis.

  • Generate, collect, store, and retain audit data

  • Ensure the proper protection of the DPA, DCGS Enterprise, and Information Systems (ISs)

  • Monitor systems, and their environments of operation, to include developing and updating security plans, managing and controlling changes to the DPA, and assessing the security impact of those changes

  • Ensure physical and environmental protection measures are executed with appropriate security officials Ensure hardware, software, and firmware on ISs are operated, maintained, and disposed of IAW security policies, configuration management policies, and procedures as outlined in the security authorization artifacts

  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties

  • Ensure all users have the requisite security clearances, authorization, need-to-know, and are provided security awareness training before granting access to the IS

  • Report all security-related incidents to the ISSM

  • Conduct periodic reviews of information systems to ensure compliance with the security authorization artifacts and report finding to Government program lead(s)

  • Notify the ISSM, in consultation with 27 IS, 480 ISRW/SC and 480 ISRW/SO, of any changes or modifications to hardware, software, or firmware of a system that might affect system authorization

  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly

  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals

  • Ensure audit records are collected and reviewed IAW ICS 500-27, Collection and Sharing of Audit Data

  • Ensure approved procedures are used by personnel for sanitizing and releasing system components and media

  • Maintain a repository of all security authorizations for ISs applicable to the DPA

  • Coordinate IS security inspections, tests, and reviews

  • Ensures proper measures are taken when an IS incident or vulnerability is discovered IAW with governing guidance

  • Develop and implement an IS security education, training, and awareness program for contractor personnel

  • Provide input to the Government to develop and update System Security Authorization Agreement (SSAA), and inclusion in the DCGS SSAA or other applicable security accreditation documentation

  • Coordinate, review, and provide input to CCBs concerning system accreditations (i.e. network drawings, equipment lists, operational procedures, Trusted Facility Manuals (TFMs), Software Version Description Documents (SVDDs), and security procedures)

  • Prepare all on-site information assurance documentation

  • Populate the XACTA database with all bodies of evidence to support system accreditation actions Create Plans-of-Action and Milestones (POA&M) based on Security Assessment Reports (SAR) developed during system accreditation actions

  • Participate in DCGS security planning sessions and working groups

  • Oversee account authorization, creation, and management

  • Be responsible for the day-to-day security accreditation and certification of the systems

Key Requirements:

  • Clearance: TS/SCI

  • Minimum of four (4) years’ IA experience

  • Possess IAT Level II Security + Certification

  • Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures

  • Location: On Customer Site

  • US Citizenship Required


GDIT IS YOUR PLACE:

  • 401K with company match

  • Comprehensive health and wellness packages

  • Internal mobility team dedicated to helping you own your career

  • Professional growth opportunities including paid education and certifications

  • Cutting-edge technology you can learn from

  • Rest and recharge with paid vacation and holidays

#GDITPriority

The likely salary range for this position is $83,429 - $103,500. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.

Scheduled Weekly Hours:

40

Travel Required:

Less than 10%

Telecommuting Options:

Onsite

Work Location:

USA VA Langley AFB

Additional Work Locations:

Total Rewards at GDIT:

Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.

We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

We connect people with the most impactful client missions, creating an unparalleled work experience that allows them to see their impact every day. We create opportunities for our people to lead and learn simultaneously. From securing our nation’s most sensitive systems, to enabling digital transformation and cloud adoption, our people are the ones who make change real.

Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans

Average salary estimate

$93464.5 / YEARLY (est.)
min
max
$83429K
$103500K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Information Systems Security Officer (ISSO), GDIT

GDIT is on the lookout for a dedicated Information Systems Security Officer (ISSO) to join our team at Langley Air Force Base in Virginia. If you're passionate about information security and looking to tackle some of the most complex technical challenges in the defense sector, we want to hear from you! As the ISSO, you'll play a critical role in supporting the Air Force's Distributed Common Ground System (DCGS) services within a global operating environment. Your responsibilities will range from validating configuration changes for firewalls and routers to developing and revising security plans. You'll also monitor systems for compliance, oversee user access controls, and ensure all security-related incidents are promptly reported and addressed. It’s a position where detail and a proactive approach make all the difference. We are looking for someone with at least four years of relevant experience, a Top Secret/SCI clearance, and an IAT Level II Security+ certification. Beyond the daily tasks, working at GDIT means you’ll have the opportunity to participate in strategic security planning and development of security education programs. Plus, with benefits geared to support your health, career growth, and work-life balance, you'll find a supportive environment ready for you to thrive!

Frequently Asked Questions (FAQs) for Information Systems Security Officer (ISSO) Role at GDIT
What are the key responsibilities of the Information Systems Security Officer (ISSO) at GDIT?

The Information Systems Security Officer (ISSO) at GDIT plays a crucial role in supporting the Air Force's Distributed Common Ground System (DCGS). Key responsibilities include validating firewall and router configurations, managing compliance with security policies, developing and executing security plans, and ensuring all users have the necessary clearances and training. Additionally, the ISSO is responsible for monitoring security incidents and maintaining up-to-date security documentation.

Join Rise to see the full answer
What qualifications do I need to apply for the ISSO position at GDIT?

To qualify for the Information Systems Security Officer (ISSO) position at GDIT, candidates must have a minimum of four years of relevant experience, a Top Secret/SCI clearance, and an IAT Level II Security+ certification. Additionally, strong knowledge of information systems security principles and best practices is essential for success in this role.

Join Rise to see the full answer
What kind of work environment can I expect as an ISSO at GDIT?

As an ISSO at GDIT, you will work in a supportive team environment at Langley Air Force Base, collaborating with skilled professionals who are dedicated to tackling complex security challenges. GDIT fosters a culture of continuous learning and professional growth, providing opportunities for training and development. You’ll also enjoy a flexible work schedule to help balance your personal and professional life.

Join Rise to see the full answer
Are there opportunities for professional development for the ISSO role at GDIT?

Yes! GDIT is committed to professional development for its employees, including those in the Information Systems Security Officer (ISSO) role. We offer various opportunities for paid education, certifications, and internal mobility, allowing you to develop your career in information security and beyond while working on cutting-edge technology.

Join Rise to see the full answer
What benefits can I expect as an ISSO at GDIT?

As an Information Systems Security Officer (ISSO) at GDIT, you'll enjoy a comprehensive benefits package that includes health and wellness plans, a 401(k) plan with company matching, and various paid time off options like vacation and sick days. GDIT prioritizes work-life balance and regularly reviews its benefits to ensure they reflect the needs and desires of its employees.

Join Rise to see the full answer
Common Interview Questions for Information Systems Security Officer (ISSO)
Can you explain the importance of user access controls in information systems security?

User access controls are critical in information systems security as they ensure that only authorized personnel can access sensitive data and systems. This minimizes the risk of data breaches and ensures compliance with security policies. In your response, emphasize the significance of principle of least privilege—the idea that users should have only the access necessary to perform their jobs.

Join Rise to see the full answer
How do you stay updated with the latest cybersecurity threats?

Staying updated with the latest cybersecurity threats is vital for an ISSO. Discuss methods such as subscribing to security newsletters, attending industry conferences, participating in online forums, and following cybersecurity experts on social media. You can also mention leveraging intelligence from security organizations to inform your strategies.

Join Rise to see the full answer
What steps would you take in the event of a security breach?

In the event of a security breach, I would first initiate the incident response plan, which entails containing the breach to prevent further data loss. Then, I would conduct a thorough investigation to determine the breach’s source and extent, inform affected stakeholders, and communicate with cybersecurity teams to rectify the issue. It's also vital to document the incident and adjust security measures to prevent recurrence.

Join Rise to see the full answer
Can you describe a time when you successfully implemented a security policy?

When discussing a successful implementation of a security policy, share specific examples of the policy, the process you undertook to introduce it within the organization, and the outcomes. Highlight how you engaged with various teams to ensure understanding and compliance among all employees.

Join Rise to see the full answer
What tools and technologies do you think are essential for an ISSO?

Key tools for an ISSO include security information and event management (SIEM) systems for monitoring and analyzing security events, vulnerability scanners for identifying weaknesses, and incident response platforms for effective management of security incidents. Discuss familiarity with tools relevant to systems used by GDIT.

Join Rise to see the full answer
How do you approach developing security training programs for personnel?

When developing security training programs, I assess the current knowledge and skill levels of personnel to tailor the content accordingly. It’s essential to incorporate real-life scenarios and offer interactive components to enhance understanding. Continuous feedback is crucial to refine and improve training effectiveness.

Join Rise to see the full answer
What is the role of compliance in information security?

Compliance in information security is integral as it ensures that an organization adheres to laws, regulations, and internal policies designed to protect sensitive data. Non-compliance can lead to serious legal penalties and reputational damage. Highlight your experience with compliance frameworks relevant to GDIT.

Join Rise to see the full answer
How would you handle conflicting priorities when it comes to security measures?

Handling conflicting priorities requires a structured approach. I would assess the risks associated with each priority and consult with stakeholders to determine the best course of action that aligns with organizational objectives. Communication is key to ensuring all parties understand the rationale behind security decisions.

Join Rise to see the full answer
What methodologies do you use for risk assessment?

For risk assessment, I typically use methodologies such as NIST SP 800-30 or ISO 27005, which guide identifying, evaluating, and prioritizing risks based on potential impacts and likelihood. Sharing specific examples of how you’ve effectively utilized these methodologies will showcase your expertise.

Join Rise to see the full answer
Can you detail how you ensure security compliance during system modifications?

Ensuring security compliance during system modifications involves thorough testing and validation processes. I analyze the impact of changes on the existing security posture and update relevant documentation accordingly. Regular audits and consultations with security teams also help maintain adherence to compliance requirements during the modification process.

Join Rise to see the full answer
Similar Jobs
GDIT Hybrid USA VA Fort Eustis
Posted 8 days ago

Become a vital part of GDIT's mission as a Systems Engineer, providing tailored technology solutions to enhance safety and efficiency for our clients.

Posted 19 hours ago

As a Cloud Cybersecurity & Automation Engineer at GDIT, you will play a key role in enhancing cloud security and operational efficiency for critical missions.

HSO Remote No location specified
Posted 9 days ago

Join HSO as a Junior IT Support Engineer and play a crucial role in supporting internal users with technical assistance in a hybrid work environment.

Photo of the Rise User
Posted 13 days ago

The Metropolitan Opera seeks a motivated Network Security Administrator to elevate its cybersecurity operations in a dynamic hybrid work environment.

Photo of the Rise User

Join Portfolio BI as a DevOps Engineer and play a key role in optimizing software deployment within a dynamic remote team.

Photo of the Rise User

OpenGov is looking for a Senior Business Systems Administrator to enhance their GTM systems with a focus on Salesforce and AI technologies.

Photo of the Rise User
Inclusive & Diverse
Empathetic
Collaboration over Competition
Growth & Learning
Transparent & Candid
Medical Insurance
Dental Insurance
Mental Health Resources
Life insurance
Disability Insurance
Child Care stipend
Employee Resource Groups
Learning & Development

Take on a key role in technology risk management at American Express as an Information Security Manager focused on audit and compliance oversight.

Photo of the Rise User
Continental Remote Strada Avram Imbroane, Timișoara, Romania
Posted yesterday

Join Continental’s innovative team as a Privileged Access Management Consultant, where you'll implement state-of-the-art security solutions for a global environment.

Photo of the Rise User

Join AIG as a Vice President Claims Application Technical Lead to innovate and enhance technology solutions within Claims Technology.

Shell Remote London - Shell Centre
Posted 6 days ago

Join Shell's Digital Innovation team as an Analyst and play a key role in driving digital transformation initiatives.

MATCH
VIEW MATCH
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
April 20, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Toledo just viewed Registered Nurse (Part-time) at Calibrate
Photo of the Rise User
Someone from OH, Toledo just viewed Clinical Research Associate II at Alimentiv
Photo of the Rise User
Someone from OH, Cleveland just viewed IT Support Engineer at Level AI
Photo of the Rise User
Someone from OH, Dayton just viewed Customer Content Specialist at Cision
Photo of the Rise User
Someone from OH, Cuyahoga Falls just viewed Senior Corporate Communications Manager at Bumble Inc.
Photo of the Rise User
Someone from OH, Cincinnati just viewed Senior Financial Analyst at Workday
Photo of the Rise User
Someone from OH, Cincinnati just viewed Financial Planning and Analysis Lead at JLL
Photo of the Rise User
Someone from OH, Cincinnati just viewed Senior Financial Analyst at American Express
Photo of the Rise User
Someone from OH, Cincinnati just viewed Senior Analyst, Operations at American Express
Photo of the Rise User
Someone from OH, Cincinnati just viewed Strategic Finance Analyst, Corporate at Benchling
Photo of the Rise User
Someone from OH, Cincinnati just viewed Senior Analyst, Project Finance at Apex Clean Energy
Photo of the Rise User
Someone from OH, Cincinnati just viewed Senior FP&A Analyst, Sales at GitLab
Photo of the Rise User
Someone from OH, Cincinnati just viewed FP&A Analyst at Lithic
Photo of the Rise User
15 people applied to Junior Security Engineer at Epic
Photo of the Rise User
Someone from OH, Westerville just viewed Summer Internship - Public Health Data Science at Cotiviti
V
Someone from OH, Cincinnati just viewed Part-Time Executive/Personal Assistant at VirtuHire
Photo of the Rise User
Someone from OH, Chillicothe just viewed Area Manager at The Hemp Co by Curaleaf at Curaleaf