Information Systems Security Officer; ISSO
Listed on 2026-01-24
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Network Security
Type of Requisition: Pipeline
Clearance Level Must Currently Possess: Secret
Clearance Level Must Be Able to Obtain: Secret
Public Trust/Other
Required:
None
Job Family: Cyber and IT Risk Management
Job Qualifications:
Skills: Cybersecurity Policy, Information Systems, Information System Security, System Security
Certifications: None
Experience: 8+ years of related experience
US Citizenship
Required:
Yes
GDIT is seeking an Information Systems Security Officer (ISSO) in support of the Defense Information Systems Agency (DISA) Global Video Services (GVS) business area to enable and sustain the integration of video services into the Department of War. This position is a combination of remote (20%) and onsite (80%) support in Fort Meade, MD or Chantilly, VA.
NOTE: This position is contingent upon contract award and task funding.
MEANINGFUL WORK AND PERSONAL IMPACTThis professional will play a crucial role in developing and maintaining System Security Plans (SSP) and creating and maintaining documentation required for ATO (Authorization to Operate) accreditation. This professional should exhibit experience in managing and automating the cyber security compliance and risk management process using DISA Enterprise Mission Assurance Support Service (eMASS) and strong familiarity with DoD and DISA Standard Operation Procedures (SOPs) for cyber security.
HOWAN INFORMATION SYSTEMS SECURITY OFFICER WILL MAKE AN IMPACT
- Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established IA standards and regulations, and recommend mitigation strategies
- Validate and verify system security requirements definitions and analysis and establishes system security designs
- Design, develop, implement and/or integrate IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements
- Build IA into systems deployed to operational environments
- Assist architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application security policy and enterprise solutions
- Support the building of security architecture
- Enforce the design and implementation of trusted relations among external systems and architectures
- Assess and mitigate system security threats/risks throughout the program life cycle
- Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations
- Work closely with existing GDIT Cyber Team within the DISA Portfolio to ensure quality consistency and knowledge sharing
Security clearance: Active Secret
Certification: DoD 8570 IAT/IAM II certification (Security+ CE, or similar)
Education: Bachelor of Science in Computer Science, or equivalent experience in lieu of degree.
Experience: 8+ years of related experience
Technical skills:
- Experience in developing and reviewing Authorization packages and artifacts
- Experience in evaluating security solutions to ensure they meet security requirements for processing classified information
- Prior Defense experience, preferably with DISA or similar agencies
- Expert knowledge of cloud cybersecurity technology principles, methods, and techniques, as well as knowledge of the associated hardware, software, and equipment
- Knowledge of the Defense Risk Management Framework (RMF) processes, Federal Information Security Management Act (FISMA), etc.
- Experience with ACAS, STIGs, and HBSS
- Experience with Azure Cloud services and cybersecurity requirements
- Expertise in cybersecurity programs, policies, and implementation in support of Defense and its Combatant Commands, Services, and Agencies (CC/S/As)
- Strong familiarity with Defense and DISA SOPs for cybersecurity, including understanding the guidelines and procedures for maintaining compliant security postures
- Proper knowledge and technical expertise relevant to the Computing Environment (CE) requiring support
- Extensive experience…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).