Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Information Systems Security Officer image - Rise Careers
Job details

Information Systems Security Officer

ManTech seeks a motivated, customer-oriented Information Systems Security Officer II to join our team in the El Segundo, CA area.

The ISSO’s primary function is working within Special Access Programs (SAPs) supporting SMC and AFSPC mission areas. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.

Performance shall include:

  • Review, prepare, and update AIS accreditation packages. Identify AIS vulnerabilities and implement countermeasures.
  • Notify customer when changes occur that might affect AIS accreditation/certification.
  • Perform AIS self-inspections, provide security coordination and review of all system test plans.
  • Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system accreditation packages.
  • Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities.
  • Prepare reports on the status of security safeguards applied to computer systems.
  • Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices.
  • Must complete training on Joint Security Implementation Guidance (JSIG) and Risk Management Framework (RMF) Information Security Continuous Monitoring (ISCM).

Minimum Qualifications:

  • Bachelor’s degree, an additional 4 years of experience might be substituted for a degree.
  • 3+ years of related experience.
  • 2+ years of relevant SCI experience.
  • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire.
  • Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.

Preferred Qualifications:

  • 1+ year of SAP-related experience highly desired.
  • The ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners. .
  • Possess a high degree of originality, creativity, initiative requiring minimal supervision.
  • Willingness to travel within the organizational Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)

Clearance Requirements:

  • US Citizenship with an active Top-Secret Clearance with SCI Eligibility .
  • Eligibility for access to Special Access Program.
  • Willingness to submit to a polygraph.

Physical Requirements:

  • Must be able to remain in a stationary position 50%.
  • Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
  • Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
  • Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.

Average salary estimate

$90000 / YEARLY (est.)
min
max
$80000K
$100000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Information Systems Security Officer, ManTech

ManTech is excited to welcome a dedicated Information Systems Security Officer II to our vibrant team based in the El Segundo, CA area. If you're passionate about safeguarding sensitive information and enjoy working in a dynamic environment, this role is tailored for you! As an ISSO, your main focus will be on managing Special Access Programs (SAPs) that support crucial missions from SMC and AFSPC. Your daily tasks will revolve around preparing and reviewing AIS accreditation packages, identifying vulnerabilities, and implementing effective countermeasures to enhance security. You'll also play a critical role in conducting security surveys, performing self-inspections, and coordinating security-related activities across various locations. We value meticulousness, as you'll be responsible for maintaining security records and reporting on the effectiveness of existing safeguards. To thrive in this position, a bachelor’s degree is preferred, but we’ll consider candidates with a strong background of at least 3 years in security and 2 years with SCI, especially if you have knowledge of DoD security policies. Ideal candidates will also possess a Top-Secret clearance and be comfortable traveling as needed. If you're looking for a rewarding career where your skills can make a difference, we invite you to learn more about the challenging opportunities at ManTech.

Frequently Asked Questions (FAQs) for Information Systems Security Officer Role at ManTech
What are the responsibilities of the Information Systems Security Officer at ManTech?

The Information Systems Security Officer (ISSO) at ManTech carries out a variety of crucial tasks. This includes managing compliance with security policies for Collateral, Sensitive Compartmented Information (SCI), and Special Access Programs (SAP). The ISSO will prepare and update AIS accreditation packages, perform self-inspections, and conduct security coordination for all system test plans. They also engage in security surveys and maintain security documentation necessary for system accreditation, ensuring that all systems operate according to established security standards.

Join Rise to see the full answer
What qualifications are needed for the ISSO position at ManTech?

To be considered for the Information Systems Security Officer position at ManTech, candidates typically need a bachelor's degree and at least 3 years of related experience, with 2 years specifically in SCI environments. Familiarity with security manuals and DoD directives is essential. Additionally, candidates must meet certification requirements within 6 months of hire, ideally holding an active Top-Secret clearance with SCI eligibility.

Join Rise to see the full answer
What does the training process include for the Information Systems Security Officer at ManTech?

At ManTech, the training process for the Information Systems Security Officer includes completing a comprehensive program in Joint Security Implementation Guidance (JSIG) and Risk Management Framework (RMF) Information Security Continuous Monitoring (ISCM). This training is essential to ensure that the ISSO stays up-to-date with the latest security practices and is equipped to handle the complexities of their role effectively.

Join Rise to see the full answer
What experience is preferred for the ISSO role at ManTech?

Ideal candidates for the Information Systems Security Officer II role at ManTech are those who possess at least 1 year of experience specifically within Special Access Programs (SAPs). Additionally, the ability to thrive in a fast-paced environment and effectively communicate with diverse personnel across the DOD is highly valued. Candidates should demonstrate originality and creativity, showcasing their capability to work both independently and collaboratively.

Join Rise to see the full answer
What is the work environment like for the ISSO at ManTech?

The work environment for the Information Systems Security Officer at ManTech is dynamic and collaborative. Employees will interact regularly with military and civilian personnel, as well as industry partners. The role may require occasional travel within the Area of Responsibility (AOR), offering a mix of desk-based tasks and hands-on engagements, such as conducting security surveys or presenting reports.

Join Rise to see the full answer
Common Interview Questions for Information Systems Security Officer
How do you approach preparing and updating AIS accreditation packages?

In preparing AIS accreditation packages, it is essential to gather and organize all necessary documentation systematically. I would first review existing materials for compliance with DoD standards, ensuring that any updates reflect the latest security policies. It is important to conduct thorough vulnerability assessments and engage cross-functional teams to validate each aspect of the package before submission.

Join Rise to see the full answer
Can you explain your experience with conducting security inspections?

I have hands-on experience conducting security inspections, which includes assessing compliance with security protocols and identifying any potential vulnerabilities. During these inspections, I focus on coordinating with various teams to collect relevant security documentation and ensuring that all findings are well-documented and addressed appropriately to enhance overall security posture.

Join Rise to see the full answer
What methods do you use to identify AIS vulnerabilities?

To identify AIS vulnerabilities, I employ a combination of automated tools and manual assessments. I believe in following a thorough risk management process that includes reviewing system architectures, performing vulnerability scans, and conducting penetration tests. Additionally, gathering feedback from users about potential weak points can provide insight into vulnerabilities that may not be captured through technical means alone.

Join Rise to see the full answer
How familiar are you with the DoD Directive 8570.01-M requirements?

I am very familiar with the DoD Directive 8570.01-M requirements. I understand the importance of Information Assurance certifications and have ensured compliance with these standards in my past roles. I keep myself updated on any changes or requirements, as I know how critical they are for maintaining operational security within a defense environment.

Join Rise to see the full answer
Could you provide an example of a challenging security incident you've dealt with?

One challenging security incident involved a potential data breach that required immediate action. I coordinated with IT teams to perform an audit of system access logs and user privileges. After identifying the source of the anomaly, I helped implement additional security measures and revised our incident response plan to mitigate future risks. This experience taught me the importance of prompt action and collaboration in maintaining security.

Join Rise to see the full answer
What role does communication play in the ISSO position at ManTech?

Communication is a key component of the ISSO position at ManTech. It's vital to convey security policies and updates clearly to all personnel, ensuring comprehension and compliance. I prioritize open communication channels with cross-functional teams, which fosters a collaborative environment. Additionally, being able to present security status reports effectively helps in maintaining transparency and trust among stakeholders.

Join Rise to see the full answer
How do you keep current with security trends and updates?

To stay current with security trends and updates, I engage in continuous professional development through attending workshops, participating in online courses, and subscribing to relevant industry publications. Networking with professionals in security forums also provides insights into emerging threats and best practices, allowing me to adapt and implement effective security measures rapidly.

Join Rise to see the full answer
Describe your experience working with Special Access Programs (SAPs).

In my previous roles, I've had significant exposure working within Special Access Programs (SAPs). This experience involved ensuring compliance with SAP security protocols, coordinating with various defense and military entities, and overseeing sensitive projects. My comprehensive understanding of SAP requirements equips me to manage the security needs unique to this environment proficiently.

Join Rise to see the full answer
What tools do you find most effective for managing security compliance?

I find that tools like security information and event management (SIEM) systems effectively streamline compliance management. Additionally, vulnerability assessment tools and GRC software play a significant role in maintaining security standards. Using these tools enables me to automate essential compliance processes, allowing me to focus on more strategic security initiatives.

Join Rise to see the full answer
How would you handle conflicting priorities in your ISSO role?

Handling conflicting priorities is a common aspect of the ISSO role. I approach this by assessing the urgency and impact of each task. Effective prioritization combined with open communication with stakeholders helps in managing expectations. By clearly defining which issues require immediate attention and which can be scheduled for later, I ensure efficient workflow and continue to maintain high security standards.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
ManTech Hybrid US, Virginia, Fairfax, VA
Posted 3 days ago
Photo of the Rise User
ManTech Hybrid US, Prince William County, VA; Virginia, Quantico, VA
Posted 3 days ago
Photo of the Rise User
Posted 24 hours ago
Photo of the Rise User
Posted 9 days ago
Photo of the Rise User
CACI International Hybrid Springfield, Virginia, United States
Posted 6 days ago
Photo of the Rise User
Ramboll Remote Fairfax Drive 4245, Arlington, VA, United States
Posted 6 days ago
Photo of the Rise User
Allen Integrated Solutions Hybrid Chantilly, Virginia, United States
Posted 3 days ago

ManTech advances customer success by delivering best-in-class solutions, consulting services, and technologies that meet our customers’ mission-critical needs anytime and anywhere.

75 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
April 2, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
J
Someone from OH, Circleville just viewed ITINERARY ADVISOR REMOTE at JTBJ Enterprise LLC
Photo of the Rise User
Someone from OH, Holland just viewed Data Intelligence Intern at Actian Corporation
Photo of the Rise User
Someone from OH, Holland just viewed Program Intern, Data Engineering at Pilot Company
Photo of the Rise User
44 people applied to SOC Analyst I at Epsilon
Photo of the Rise User
30 people applied to Security Analyst Jr at DEUNA
Photo of the Rise User
11 people applied to Director CISO at Elevation Capital
Photo of the Rise User
Someone from OH, Sandusky just viewed Head of IT/Security at Aerones
Photo of the Rise User
Someone from OH, Sandusky just viewed Vice President, Technology at MedVA
I
Someone from OH, Sandusky just viewed IT Manager at Infinite Locus
Photo of the Rise User
Someone from OH, Cincinnati just viewed Finance Associate at Street Diligence
M
Someone from OH, Sandusky just viewed Director of Security, IT, & Compliance at Murmuration
W
Someone from OH, Sandusky just viewed Enterprise Technology Director at World Central Kitchen
Photo of the Rise User
Someone from OH, Sandusky just viewed Director of IT at Kyo
Photo of the Rise User
Someone from OH, North Ridgeville just viewed Remote Manager in Training- CS/Sales at Global Elite
Photo of the Rise User
Someone from OH, Cleveland just viewed Software Engineer I (DevOps) at Mastercard
C
Someone from OH, Warren just viewed Front End Developer (for AI Agent) at CyberCare
I
Someone from OH, Warren just viewed Senior Angular Lead at Integrators services a.s.
Photo of the Rise User
Someone from OH, Warren just viewed SSr. Front End Engineer (Angular.js) at NTD Software
Photo of the Rise User
Someone from OH, Warren just viewed Front-End Developer at Apex Logic
S
Someone from OH, Warren just viewed Angular Developer at Sparkland
Photo of the Rise User
Someone from OH, New Albany just viewed Diversity, Equity & Inclusion Manager at Axios
Photo of the Rise User
Someone from OH, Cincinnati just viewed Customer Service Associate at 2K
Photo of the Rise User
Someone from OH, Marion just viewed Casting: '2' at Backstage