Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Information System Security Officer (ISSO) image - Rise Careers
Job details

Information System Security Officer (ISSO)

About the Organization

Now is a great time to join Redhorse Corporation. Redhorse specializes in developing and implementing creative strategies and solutions with private, state, and federal customers in the areas of cultural and environmental resources services, climate and energy change, information technology, and intelligence services. We are hiring creative, motivated, and talented people with a passion for doing what's right, what's smart, and what works.


About the Role:

Redhorse is seeking a highly skilled Information System Security Officer (ISSO) supporting the Army INSCOM G-6 at Fort Belvoir, VA. In this critical role, you will be responsible for the overall security posture of complex information systems, ensuring compliance with stringent DoD and NIST guidelines. You will lead a team of cybersecurity professionals, directly impacting the security of sensitive national security systems and contributing significantly to Redhorse's mission of transforming how the government uses data and technology. This position offers the opportunity to work on high-impact projects within a dynamic and collaborative environment.


Key Responsibilities:
  • Oversee the security of information systems, ensuring compliance with DoD and NIST guidelines (AR 25-2, DA 25-2-14, NIST SP 800-53).
  • Manage eMASS records, validate security controls, assess scan results, and track Plan of Action and Milestones (POA&M) progress.
  • Lead ongoing monitoring efforts to maintain system security and compliance, identifying and mitigating risks proactively.
  • Manage the daily activities and professional development of a team of Cybersecurity Analysts.
  • Collaborate with the Organization Information System Security Manager (O-ISSM) to achieve and maintain Authorization to Operate (ATO) for systems on DoD/IC networks.
  • Provide regular status reporting to government leads, promptly addressing risks and security issues.
  • Collaborate with Security Control Assessors to conduct comprehensive risk assessments of systems and their impact on networks and mission data.
  • Develop and maintain cybersecurity policies, procedures, and documentation (Standard Operating Procedures (SOPs), Tactics, Techniques, and Procedures (TTPs), etc.).


Required Education/Clearance:
  • Bachelor's degree in a STEM field + 12 years of cybersecurity experience; OR 
  • Master's degree in STEM + 10 years of cybersecurity experience; OR 
  • PhD in STEM + 8 years of cybersecurity experience.
  • Must meet DoD 8140/8570.01-m requirements for a privileged user on TS/SCI systems.
  • Active Top Secret (TS) security clearance with eligibility for Sensitive Compartmented Information (SCI) and NATO access prior to starting work.


Required Experience:
  • 10 years of experience validating system security controls and managing vulnerabilities.
  • 8 years of experience with Risk Management Framework (RMF) and eMASS.
  • 5 years of experience tracking and resolving POA&Ms.
  • 3 years of experience performing continuous monitoring.


Desired Experience:
  • We encourage all candidates who meet the basic requirements to apply, even if you do not have all of the following experience:
  • Experience working with DISA Security Technical Implementation Guides (STIGs), Security Requirement Guides (SRGs), and security guides.
  • Experience leading a team of cybersecurity professionals on large Department of Defense contracts.
  • Experience with DataBricks, GitLab, or Jira.
  • Advanced certifications (e.g., CISSP, CISM).
  • Experience with cloud security architectures.


Equal Opportunity Employer/Veterans/Disabled 

 

Accommodations:

If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation if you are unable or limited in your ability to access job openings or apply for a job on this site as a result of your disability. You can request reasonable accommodations by contacting Talent Acquisition at Talent_Acquisition@redhorsecorp.com

 

Redhorse Corporation shall, in its discretion, modify or adjust the position to meet Redhorse’s changing needs.

This job description is not a contract and may be adjusted as deemed appropriate in Redhorse’s sole discretion.

Redhorse Corporation Glassdoor Company Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
Redhorse Corporation DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Redhorse Corporation
Redhorse Corporation CEO photo
Unknown name
Approve of CEO

Average salary estimate

$125000 / YEARLY (est.)
min
max
$100000K
$150000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Information System Security Officer (ISSO), Redhorse Corporation

Join Redhorse Corporation as an Information System Security Officer (ISSO) and become an essential part of our mission at Fort Belvoir, VA! Picture yourself in a vibrant environment where creativity and motivation are at the forefront of everything we do. In this pivotal role, you'll lead a talented team of cybersecurity professionals, overseeing the security posture of complex information systems. Your expertise will ensure compliance with stringent DoD and NIST guidelines, making a significant impact on national security systems. You'll be tasked with managing eMASS records, validating security controls, and proactively identifying risks to maintain system security and compliance. Working closely with the Organization Information System Security Manager, you'll help achieve crucial Authorizations to Operate (ATO) for our systems, all while developing and maintaining robust cybersecurity policies and procedures. If you have a passion for cybersecurity and want to contribute to transformative projects within a collaborative team, we invite you to bring your skills and experience to Redhorse Corporation. Together, we can redefine how the government utilizes data and technology. Explore the chance to grow both professionally and personally by applying today!

Frequently Asked Questions (FAQs) for Information System Security Officer (ISSO) Role at Redhorse Corporation
What does an Information System Security Officer (ISSO) do at Redhorse Corporation?

At Redhorse Corporation, an Information System Security Officer (ISSO) plays a crucial role in safeguarding sensitive information systems. This involves overseeing compliance with DoD and NIST guidelines, managing eMASS records, and leading a team of cybersecurity analysts. The ISSO's responsibilities ensure that our national security systems remain secure and effectively managed.

Join Rise to see the full answer
What qualifications are needed for the ISSO position at Redhorse Corporation?

To qualify for the Information System Security Officer (ISSO) position at Redhorse Corporation, candidates typically need a bachelor's degree in a STEM field plus 12 years of cybersecurity experience, or a master's degree with 10 years of experience, or a PhD with 8 years. Additionally, candidates must hold an active Top Secret clearance compatible with Sensitive Compartmented Information (SCI).

Join Rise to see the full answer
How can I apply for the ISSO position at Redhorse Corporation?

To apply for the Information System Security Officer (ISSO) position at Redhorse Corporation, you can visit our careers page where you will find detailed instructions on submitting your application. Ensure your resume highlights your relevant experience and qualifications pertaining to cybersecurity and DoD regulations.

Join Rise to see the full answer
What are the responsibilities of an ISSO at Redhorse Corporation?

The responsibilities of an ISSO at Redhorse Corporation include overseeing information systems security, managing security controls and vulnerabilities, collaborating with government leads, and leading a team to ensure compliance and maintain the security posture of systems. Additionally, the ISSO develops cybersecurity policies and tracks the progress of necessary actions.

Join Rise to see the full answer
What type of team culture can I expect at Redhorse Corporation as an ISSO?

As an Information System Security Officer (ISSO) at Redhorse Corporation, you can expect a supportive and collaborative team culture. We encourage open communication and value creativity and motivation among our staff. The teamwork enhances our problem-solving capabilities and creates an environment conducive to professional development.

Join Rise to see the full answer
Is prior experience with continuous monitoring required for the ISSO role at Redhorse Corporation?

Yes, for the Information System Security Officer (ISSO) role at Redhorse Corporation, having experience with continuous monitoring is crucial. Candidates should ideally have at least three years of continuous monitoring experience to effectively contribute to maintaining security and compliance for our information systems.

Join Rise to see the full answer
What opportunities for advancement exist for an ISSO at Redhorse Corporation?

At Redhorse Corporation, we are committed to employee growth and career advancement. As an Information System Security Officer (ISSO), you will have opportunities to lead projects, develop new cybersecurity policies, and mentor junior staff, potentially allowing you to advance into higher-level strategic roles within the organization.

Join Rise to see the full answer
Common Interview Questions for Information System Security Officer (ISSO)
Can you explain the role of an Information System Security Officer (ISSO)?

An Information System Security Officer (ISSO) ensures that information systems are secure and compliant with various regulations. This includes overseeing security assessments, managing risks, and developing cybersecurity policies. To articulate your answer effectively, emphasize your understanding of DoD and NIST compliance.

Join Rise to see the full answer
How do you approach risk management in cybersecurity?

In cybersecurity, risk management involves identifying, evaluating, and mitigating risks to information systems. Describe your experience with risk assessments, prioritizing vulnerabilities, and how you develop action plans to address them, showcasing the importance of continuous monitoring.

Join Rise to see the full answer
What experience do you have with eMASS?

Discuss your practical experience with eMASS to manage information assurance and security control assessments. Mention specific instances where you've validated controls, tracked Plan of Action and Milestones (POA&Ms), and how this tool has helped enhance overall security posture.

Join Rise to see the full answer
How do you ensure compliance with security standards?

Ensuring compliance requires a solid understanding of security frameworks like RMF and the constant monitoring of security controls. Draw upon specific examples from past roles where you implemented procedures to maintain adherence to regulations and track compliance metrics.

Join Rise to see the full answer
Can you describe a challenging cybersecurity issue you've encountered and how you resolved it?

Share a concise narrative about a particular cybersecurity challenge. Focus on how you assessed the situation, the measures you implemented, and the positive outcome. This demonstrates your problem-solving abilities under pressure.

Join Rise to see the full answer
What is your experience with developing cybersecurity policies?

Discuss the process of developing cybersecurity policies you have been involved in, focusing on the balance between security and operational efficiency. Mention how you ensure policies are up-to-date and align with organizational standards.

Join Rise to see the full answer
How do you keep current with the latest cybersecurity threats?

Continuously staying informed about the latest cybersecurity threats is vital. Mention resources you utilize such as professional organizations, online courses, and cybersecurity journals that contribute to maintaining your knowledge in the ever-evolving field.

Join Rise to see the full answer
Describe your experience with team leadership in cybersecurity environments.

Convey how you've managed or mentored teams of cybersecurity analysts, detailing strategies you've employed to foster development and efficient workflows. Highlight specific accomplishments or results achieved through effective leadership.

Join Rise to see the full answer
What advancements in cybersecurity technology are you most excited about?

Address the advancements in cybersecurity that excite you, explaining why they are significant. This can include cloud security technologies or AI tools, elaborating on how you see them shaping the future of cybersecurity practices in organizations like Redhorse Corporation.

Join Rise to see the full answer
What key qualities make a successful Information System Security Officer?

A successful ISSO should have attention to detail, strong analytical skills, and excellent leadership capabilities. Highlight these qualities along with your own experiences that exemplify these traits in real-world situations, showcasing how they contribute to effective security practices.

Join Rise to see the full answer

To Transform the Way Government Interacts with Data and Technology

17 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
November 28, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!