Information Systems Security Engineer, Senior
Listed on 2026-03-01
-
IT/Tech
Cybersecurity, Information Security, Systems Engineer
In a world of possibilities, pursue one with endless opportunities. Imagine Next!
At Parsons, you can imagine a career where you thrive, work with exceptional people, and be yourself. Guided by our leadership vision of valuing people, embracing agility, and fostering growth, we cultivate an innovative culture that empowers you to achieve your full potential. Unleash your talent and redefine what’s possible.
Job DescriptionAre you ready to make a real impact in national defense cyberspace operations? We’re seeking a skilled cybersecurity professional to join our dynamic team supporting USCYBERCOM’s internal command IT systems, integral components of the broader Joint Cyber Warfighting Architecture (JCWA).
If you're passionate about cyber defense, thrive in high-stakes environments, and want to work alongside some of the brightest minds in the field—this is your opportunity to step into a pivotal role. Imagine Next with Parsons...
What You’ll Be Doing- In this role, you’ll be at the forefront of securing mission-critical systems, helping to fortify the cyber infrastructure that underpins joint operations across the Department of Defense.
- Maintain the operational security posture of DoD information systems, ensuring compliance with RMF and related DoD, CNSSI, and NIST directives.
- Lead all phases of the Assessment & Authorization (A&A) process in alignment with DoDI 8510.01 and DoDI 8500.01.
- Serve as the principal advisor to the Information System Owner (ISO) regarding cybersecurity best practices and regulatory obligations.
- Review and validate System Security Plans (SSPs), security controls, and supporting artifacts for completeness and accuracy.
- Recommend and implement technical and procedural safeguards, tailored to mission objectives and emerging threats.
- Conduct system assessments and continuous monitoring activities to maintain the CIA Triad—Confidentiality, Integrity, and Availability.
- Collaborate with ISSMs and DAOs to ensure risk-based decisions support operational readiness and compliance.
- Active TS/SCI w/ Poly required for consideration
- Bachelor’s degree and 12+ years of experience or Master's degree and 10+ years of experience; degree should be in Computer Science, Information Assurance, Information Security System Engineering, Cybersecurity, Engineering, or a related technical/business discipline. Experience includes 6+ direct experience in cybersecurity or information assurance within DoD or Federal IT environments. Alternatively;
Master’s Degree in related discipline and 10+ years of experience. - DoD 8570 IAM Level III certification, such as CISSP or CISM.
- Proven understanding and application of RMF processes, including security control assessment, continuous monitoring, and system authorization.
- Use of strategies and technologies to safeguard sensitive information from unauthorized access, corruption, loss, or misuse across its lifecycle.
- Lead the design and implementation of advanced security architectures and technologies to protect sensitive data from unauthorized access, compromise, loss, or misuse.
- Championed enterprise-wide initiatives to uphold confidentiality, integrity, and availability (CIA) of information across its entire lifecycle.
- Ensured alignment with regulatory frameworks and industry best practices through continuous risk assessment, threat modeling, and security control optimization.
- Proficient in applying configuration management tools and practices to maintain system integrity and enforce secure baselines.
- Proven capability to identify, investigate, and elevate cybersecurity incidents, ensuring timely containment, resolution, and compliance with reporting protocols.
- Skilled in applying structured response methodologies to minimize impact and strengthen organizational resilience.
- Demonstrated expertise in leading the identification, analysis, and escalation of complex cybersecurity incidents, ensuring rapid containment, effective remediation, and adherence to regulatory reporting requirements.
- Skilled in implementing and managing security technologies, including monitoring tools, endpoint protection, IAM systems, vulnerability scanners, and threat…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).