Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
ISSO/ISSM image - Rise Careers
Job details

ISSO/ISSM

Minimum Clearance Required

Top Secret SCI

Responsibilities

I2X Technologies is a reputable technology services company to the Federal Government.  Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country.  We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states.  Our programs support multiple Federal agencies, the Department of Defense and often focused on the space initiatives of our government customers.

 

  • Develop and maintain security and accreditation packages for standalone classified networks.
  • Experience working in an RMF environment and gathering artifacts for ATO packages
  • Implement information system security requirements, system security plans, and ensure all auditing requirements are completed.
  • Ensure all system security procedures are followed including updates to system security software (patches), updates to antivirus definition files, and ensuring audit files are maintained and reviewed.
  • Research, advise on, and generate documentation as required for requesting permission to waive any cybersecurity requirements that are determined by the government customer to inhibit the foreign materiel exploitation mission to an unacceptable level.
  • Interface regularly with SC to address any issues and ensure compliance with all pertinent regulations related to Information System Security.
  • Provide Information Assurance Officers/Information System Security Manager (IAO/ISSM) functions necessary to maintain mission effectiveness.

Qualifications

  • 5-15 years of experience supporting classified workstations up to the TS/SCI Level
  • Experience with RMF and developing ATO packages including gathering artifacts
  • Current or recent experience at NASIC helpful
  • Security+ required
  • TS/SCI Clearance required

 

Essential Requirements:

US Citizenship is required.

 

Salary bands have not yet been determined for this opportunity. I2X Technologies considers factors such as (but not limited to) scope and responsibilities of the position, candidate’s work experience, education/training, key skills, internal peer equity, as well as, market and business considerations when extending an offer. 

 

Physical Demands:

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation.

 

While performing the duties of this job, the employee will regularly sit, walk, stand and climb stairs and steps. May require walking long distance from parking to work station. Occasionally, movement that requires twisting at the neck and/or trunk more than the average person, squatting/ stooping/kneeling, reaching above the head, and forward motion will be required. The employee will continuously be required to repeat the same hand, arm, or finger motion many times. Manual and finger dexterity are essential to this position. Specific vision abilities required by this job include close, distance, depth perception and telling differences among colors. The employee must be able to communicate through speech with clients and public. Hearing requirements include conversation in both quiet and noisy environments. Lifting may require floor to waist, waist to shoulder, or shoulder to overhead movement of up to 20 pounds. This position demands tolerance for various levels of mental stress.

 

I2X Technologies is an Engineering and Information Technology Company focused on providing Services to the Federal and State Government. I2X offers a competitive compensation program and comprehensive benefits package to our employees.

What You Should Know About ISSO/ISSM, Isys Technologies

Join I2X Technologies in Dayton as an ISSO/ISSM and make a difference in the Federal Government's technology services landscape! I2X Technologies is known for its commitment to innovation across various sectors, including space exploration, national security, and cybersecurity. As an ISSO/ISSM, you'll develop and maintain security and accreditation packages for standalone classified networks, ensuring compliance with vital regulations while working in a dynamic RMF environment. This role involves implementing information system security requirements, drafting system security plans, and executing stringent auditing requirements. Your expertise will guide the compliance of our systems, ensuring that cybersecurity measures meet high standards while facilitating critical missions. In addition to technical skills, strong communication is key—you will interface regularly with stakeholders to address compliance issues and generate essential documentation. If you’re ready to leverage your 5-15 years of experience supporting classified workstations and your Security+ certification, I2X Technologies could be your stage for impact and growth. We pride ourselves on fostering a culture of development, offering a competitive compensation package, and a dynamic work environment where your talents can shine. Together, let’s tackle the challenges of today’s digital landscape as we support the essential operations of our nation.

Frequently Asked Questions (FAQs) for ISSO/ISSM Role at Isys Technologies
What are the key responsibilities of the ISSO/ISSM role at I2X Technologies?

As an ISSO/ISSM at I2X Technologies, your primary responsibilities will include developing and maintaining security and accreditation packages for classified networks. You'll be required to navigate the Risk Management Framework (RMF) environment effectively, gathering artifacts for Authority to Operate (ATO) packages. Additionally, ensuring all system security procedures, performing audits, and generating documentation for waiver requests will be essential. You're expected to interface regularly with stakeholders to maintain compliance with regulations related to Information System Security.

Join Rise to see the full answer
What qualifications are needed for the ISSO/ISSM position at I2X Technologies?

Candidates for the ISSO/ISSM position at I2X Technologies should possess 5-15 years of experience supporting classified workstations, with a strong understanding of RMF and experience in developing ATO packages. A Security+ certification is required, along with a current TS/SCI clearance. Previous experience at NASIC is a plus, as it would enhance your ability to tackle challenges specific to this role. US Citizenship is also a prerequisite for this position.

Join Rise to see the full answer
What kind of experience does I2X Technologies favor for the ISSO/ISSM role?

I2X Technologies favors candidates with extensive experience in supporting classified workstations, ideally in the realm of national security and cybersecurity. Experience with Risk Management Framework (RMF), developing ATO packages, and managing system security requirements is highly valued. Furthermore, a working knowledge of security accreditation processes and a proactive approach to maintaining compliance will set you apart as a strong candidate for the ISSO/ISSM position.

Join Rise to see the full answer
What growth opportunities does I2X Technologies offer for ISSO/ISSM professionals?

At I2X Technologies, ISSO/ISSM professionals have a wealth of growth opportunities available to them. The company is dedicated to fostering long-term development through training programs and hands-on experience in cutting-edge technology projects. By engaging with various Federal agencies and working on initiative-driven projects, ISSO/ISSMs can broaden their skill set, advance their careers, and make significant contributions to national security efforts.

Join Rise to see the full answer
What is the work environment like for ISSO/ISSMs at I2X Technologies?

The work environment for ISSO/ISSMs at I2X Technologies is dynamic and collaborative, encouraging innovation and teamwork. You'll be interacting with multiple Federal agencies, focusing on meaningful missions in national security and cybersecurity. The company values the input of its employees, providing a friendly and supportive atmosphere that promotes professional development while adhering to rigorous standards in classified information assurance.

Join Rise to see the full answer
Common Interview Questions for ISSO/ISSM
Can you describe your experience with the Risk Management Framework (RMF)?

When answering this question, focus on specific instances where you've applied RMF principles in your work. Discuss how you gathered artifacts for ATO packages and ensured compliance with security requirements. Mention any challenges you faced and how you overcame them, highlighting your ability to navigate complex security environments effectively.

Join Rise to see the full answer
What steps do you take to maintain system security within classified networks?

Outline your systematic approach to maintaining system security, including regular software updates, patch management, and maintaining thorough documentation. Discuss your experience with incident response and how you've interfaced with different teams to uphold security protocols. Provide examples of your proactive measures that prevented security breaches.

Join Rise to see the full answer
How do you address compliance issues with stakeholders?

Share your communication strategy for collaborating with stakeholders on compliance issues. Discuss your experience facilitating meetings, generating documentation, and using your technical knowledge to address concerns effectively. Emphasize the importance of transparency and relationship building in ensuring compliance across teams.

Join Rise to see the full answer
What experiences do you have with generating and maintaining security documentation?

Talk about your proficiency in generating various security documentation—from system security plans to ATO packages. Offer insights into your methods for keeping this documentation current and relevant, and the role it plays in compliance. Mention any specific tools or systems you’ve used to streamline this process.

Join Rise to see the full answer
What is your approach to vulnerability assessments and risk analysis?

You should explain your methodology for conducting vulnerability assessments, including tools used and analysis techniques. Describe how you prioritize risks and determine mitigation strategies, incorporating examples where you've successfully analyzed and remediated vulnerabilities in classified systems.

Join Rise to see the full answer
Can you describe a time when you successfully navigated a challenging security incident?

Provide a detailed account of a specific security incident you managed. Highlight your role in identifying the issue, coordinating responses, and ensuring compliance with incident management protocols. Discuss lessons learned and how this experience shapes your current security practices.

Join Rise to see the full answer
What role does teamwork play in your approach as an ISSO/ISSM?

Emphasize the collaborative nature of the ISSO/ISSM role and how you engage with cross-functional teams. Share specific examples where teamwork led to successful project outcomes and enhanced security compliance, underlining your skills in collaboration and communication.

Join Rise to see the full answer
How do you stay updated with the latest cybersecurity threats and trends?

Discuss your proactive approach to staying informed on cybersecurity trends, such as following industry news, attending conferences, and participating in professional organizations. Mention any specific resources or networks you rely on to ensure you're aware of emerging threats and can apply this knowledge to your role.

Join Rise to see the full answer
What tools and technologies are you familiar with for managing cybersecurity?

Identify specific tools and technologies you’ve used, elaborating on their application in your work as an ISSO/ISSM. Mention any cybersecurity frameworks you align with and how these tools have aided in maintaining compliance and conducting effective vulnerability assessments.

Join Rise to see the full answer
How would you handle a situation where compliance requirements hinder mission effectiveness?

Describe your thought process when faced with compliance requirements that may impede mission objectives. Talk about your approach to communicate effectively with those involved, your strategies for seeking waivers, and balancing security needs with mission goals to find the best path forward.

Join Rise to see the full answer
Similar Jobs
Posted 10 days ago

I2X Technologies is seeking a Software Engineer to join their hybrid team, contributing to critical technology services for government initiatives.

Photo of the Rise User
Posted 4 days ago

Join Visa as a Systems Engineer - macOS and leverage your technical expertise to enhance the Mac environment for a global leader in payments technology.

Photo of the Rise User
Strava Hybrid San Francisco, California, United States
Posted 11 days ago
Inclusive & Diverse
Transparent & Candid
Growth & Learning
Collaboration over Competition

As part of Strava’s Security Team, you'll help protect our extensive network while ensuring seamless user experiences.

Photo of the Rise User
Posted 8 hours ago

Join Agile Defense as a Systems Administrator II and play a key role in supporting mission-critical IT infrastructure at Shaw AFB.

Photo of the Rise User
Highmark Health Remote PA, Working at Home - Pennsylvania
Posted 2 days ago

We are looking for a seasoned Senior Architect to spearhead innovative architecture solutions that align with our business capabilities at enGen.

Photo of the Rise User
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Customer-Centric
Social Impact Driven
Rapid Growth
Maternity Leave
Paternity Leave
Medical Insurance
Dental Insurance
Vision Insurance
Mental Health Resources
Life insurance
Disability Insurance
Health Savings Account (HSA)
Flexible Spending Account (FSA)
Paid Holidays
Paid Time-Off

Join Samsara as a Senior Security Engineer to strengthen their security infrastructure and drive impactful solutions for diverse industries.

Photo of the Rise User

Peraton is seeking an Entry Level PC Technician to provide vital IT support in Virginia Beach for the Special Operations Command.

Photo of the Rise User
Datacom Remote No location specified
Posted 3 days ago

Elevate your networking career with Datacom as a Senior Network Engineer, impacting enterprise infrastructures across Australia and New Zealand.

Join Houston Methodist as a Senior Application Analyst to lead application configuration and support while mentoring junior team members within a dynamic healthcare environment.

MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
April 19, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Dayton just viewed Data Engineer- Maps at Apple
Photo of the Rise User
Someone from OH, Cleveland just viewed Part-time driver | Columbus, OH at Uber
Photo of the Rise User
Someone from OH, Youngstown just viewed DashMart Team Member - Downers Grove at DoorDash USA
Photo of the Rise User
Someone from OH, Springfield just viewed Software Engineer, Emerging Talent (Consumer) at Coinbase
Photo of the Rise User
Someone from OH, Springfield just viewed Information Security Analyst at American Express
Photo of the Rise User
Someone from OH, Springfield just viewed Associate Security Operations Analyst at Zopa
Photo of the Rise User
Someone from OH, Springfield just viewed Security & IT Operations Analyst at Kepler Communications
Photo of the Rise User
Someone from OH, Springfield just viewed Corporate IT Engineer at HHAeXchange
Photo of the Rise User
Someone from OH, Springfield just viewed Create your own role at Twingate
Photo of the Rise User
Someone from OH, Mason just viewed Programmer Analyst at VEGA Americas
Photo of the Rise User
66 people applied to Cybersecurity Intern at Dewberry
Photo of the Rise User
Someone from OH, Cincinnati just viewed Quality Assurance Specialist at Tala
Photo of the Rise User
12 people applied to Junior Oracle DBA at Optimiza
Photo of the Rise User
Someone from OH, Canton just viewed Cart pusher Courtesy Clerk at Meijer
Photo of the Rise User
Someone from OH, Columbus just viewed Warehouse Associate- Columbus, OH at MAERSK
Photo of the Rise User
Someone from OH, Cincinnati just viewed Consumer Insights Research Executive (Mid-level) at NielsenIQ
Photo of the Rise User
Someone from OH, North Royalton just viewed Staff Forward Deployed Engineer at Ridgeline
Photo of the Rise User
Someone from OH, North Royalton just viewed Software Engineer (L2) at Twilio
Photo of the Rise User
Someone from OH, Columbus just viewed Field Service Associate- Greeting Card Sales at Harper Group
Photo of the Rise User
Someone from OH, Hamilton just viewed Material Handler - 2nd shift at Cardinal Health
Photo of the Rise User
Someone from OH, Alliance just viewed Director - Music Publishing Licensing at SoundCloud
Photo of the Rise User
Someone from OH, Cincinnati just viewed M365 Technical Advisor at Upwork