Information System Security Officer
Listed on 2026-01-11
-
IT/Tech
Cybersecurity, Information Security
Company Description
Founded in 1989, SOSi is among the largest private, founder‑owned technology and services integrators in the defense and government services industry. We deliver tailored solutions, tested leadership, and trusted results to enable national security missions worldwide.
Job DescriptionJoin the Cyber Team in Paradise. SOSi is looking for a seasoned Information Systems Security Officer (ISSO) ready to lead the charge in securing mission‑critical IT operations at Joint Base Pearl Harbor Hickam, Honolulu. As part of a dynamic team supporting over 5,000 users across the Pacific theater, you'll be at the forefront of solving complex technical challenges that drive real‑time Command and Control (C2) strategies.
This isn't just a job - it's a mission. You'll own the full Risk Management Framework (RMF) lifecycle, from identifying vulnerabilities to engineering resilient security controls. If you're fluent in DoD protocols, thrive in high‑stakes environments, and can deliver executive‑level insights with clarity and precision, this is your opportunity to make a strategic impact where it matters most.
EssentialJob Duties
- Assist the ISSM in formulating and upholding an organized information system security program and policies applicable to their assigned area of responsibility.
- Establish and maintain secure computer systems and networks for classified processing, and take responsibility for the administration, maintenance, and security auditing of such systems.
- Develop and supervise the implementation of guidelines and policies for operational information systems security.
- Manage assigned eMASS packages containing all security authorizations for information systems under their supervision.
- Coordinate inspections, tests, and reviews of information system security.
- Assist in responding to security incidents and protecting organizational assets.
- Support the patch and vulnerability management program using ACAS.
- Maintain Security Technical Implementation Guidelines (STIG) and update them quarterly.
- Ensure compliance with Configuration Management policies for authorizing the use of hardware and software on an information system.
- Facilitate coordination of interconnection requests and ensure efficient processing and approval.
- Keep current knowledge of system functions, security policies, technical security safeguards, and operational security measures.
- Execute the information security continuous monitoring plan.
- Maintain records of security‑related vulnerabilities POA&Ms and report serious or unresolved violations to the AO/DAO.
- Evaluate changes to the system, its environment, and operational requirements that could impact security authorization.
Minimum Requirements
- An active in‑scope SECRET clearance.
- Bachelor's degree in a related field plus 4 years of related experience.
- DoD 8570 IAT‑II compliant (Security+, CE, CCNA, CND, CySA+, GICSP, GSEC, or SSCP).
- Knowledge of NSA's Commercial Solution for Classified (CSfC) and Cross Domain Solutions (CDS).
- Thorough understanding of NIST Publication 800‑53r5, RMF, Executive Order 14028, and OMB Mandate M‑22‑09.
- Prior experience with eMASS.
- Strong communication skills and ability to coordinate tasks across functional groups.
- An active in‑scope TOP SECRET clearance with SCI eligibility.
- Recent experience in the assessment and authorization of systems.
- Practical knowledge of JIRA and Confluence.
- Experience with compliance tools such as Tenable Nessus and SCAP.
- Experience in program policy and process creation and oversight.
- Working conditions are normal for an office environment.
- Fast‑paced, deadline‑oriented environment.
- May require periods of non‑traditional working hours including consecutive nights or weekends.
- Target Salary Range: $110,556 to $136,257.
All interested individuals will receive consideration and will not be discriminated against for any reason.
#J-18808-Ljbffr(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).