Specialist, Cyber Intelligence Security Clearance
Job in
Greenville, Hunt County, Texas, 75401, USA
Listed on 2026-01-14
Listing for:
L3Harris Technologies
Full Time
position Listed on 2026-01-14
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, Systems Engineer, Network Security
Job Description & How to Apply Below
L3
Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers' mission and quest for professional growth. L3
Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do. L3
Harris Technologies is the Trusted Disruptor in the defense industry. With customers' mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security.
Job Title:
Specialist, Cyber Intelligence (ISSO) Job
Job Location:
Greenville, Texas;
On-site
Job Schedule:
9/80, off every other Friday, 1st shift
Job Description:
L3
Harris Greenville, Texas, is seeking an Information System Security Officer (ISSO) in support of Department of Defense programs for our facility located in Greenville, TX. Primary responsibilities of this position include:
* Identifying information system vulnerabilities and working with system owners to implement countermeasures or corrections
* Interacting with users and the ISSM when changes occur that may affect the information system accreditation/certification
* Identifying the information protection needs for systems, software and networks
* Use Vulnerability Scanning Tools to scan networks/applications and identify weaknesses. Use results and correct/remediate the findings.
* Track Software Vulnerability Findings and Software Patches.
* Provide input for various artifacts supporting the RMF package to include the System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Plan of Actions & Milestones (POA&M), Continuous Monitoring (Con Mon) Plan, CONOPS, and other RMF BoE artifacts.
* Support IA Program compliance by performing periodic self-inspections, tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed.
* Participate in documenting and reviewing security related workflows and procedures to mitigate vulnerabilities and recommend changes to system or system components.
Essential Functions:
* Identifying information system vulnerabilities and working with system owners to implement countermeasures or corrections
* Interacting with users and the ISSM when changes occur that may affect the information system accreditation/certification
* Identifying the information protection needs for systems, software and networks
* Use Vulnerability Scanning Tools to scan networks/applications and identify weaknesses. Use results and correct/remediate the findings.
* Track Software Vulnerability Findings and Software Patches.
* Provide input for various artifacts supporting the RMF package to include the System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Plan of Actions & Milestones (POA&M), Continuous Monitoring (Con Mon) Plan, CONOPS, and other RMF BoE artifacts.
* Support IA Program compliance by performing periodic self-inspections, tests and reviews of the IS to ensure that systems are operating as authorized/accredited and that conditions have not changed.
* Participate in documenting and reviewing security related workflows and procedures to mitigate vulnerabilities and recommend changes to system or system components.
* Ability to obtain and maintain any additional clearances as required.
* Up to 5% travel may be required.
Qualifications:
* Bachelor's Degree and minimum 4 years of prior relevant experience. Graduate Degree and a minimum of 2 years of prior related experience. In lieu of a degree, minimum of 8 years of prior related experience.
* Must have an Active Top Secret clearance with SCI eligibility
* Relevant experience with Windows 10 operating systems, Linux operating systems and other related peripherals.
* Experience using Microsoft Office products.
* Experience with Nessus, ACASS or other vulnerability scanning software
* Experience with RMF/Assessment and Authorization (A&A) safeguards to meet…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×