Cybersecurity Analyst – ISSO/Threat & SOC Monitoring
Listed on 2026-01-12
-
IT/Tech
Cybersecurity, Information Security, Security Manager
Location: California
Cybersecurity Analyst – ISSO Support / Threat & SOC Monitoring
Join to apply for the Cybersecurity Analyst – ISSO Support / Threat & SOC Monitoring role at People Tec, Inc.
OverviewPeople Tec is currently seeking a Cybersecurity Analyst – ISSO Support / Threat & SOC Monitoring to support our Camp Roberts (San Miguel, California) location. The local defender role combines ISSO responsibilities with those of a traditional Security Operations Center (SOC) and a threat analyst. The position is pivotal in maintaining the cybersecurity posture of systems under its purview, supporting system authorization, implementing cybersecurity policies, and ensuring continuous monitoring in accordance with DoD Risk Management Framework (RMF).
The candidate will proactively manage compliance with cybersecurity directives, respond to incidents, and support the Government customer by implementing technical and procedural safeguards aligned with RMF controls. The preferred candidate is an experienced ISSO with in-depth knowledge of NIST 800‑53 controls, the RMF lifecycle, and DoD cybersecurity policies (DoDI 8510.01, 8500.01, AR 25‑2). The role requires the ability to work independently, support system owners, and lead the documentation, authorization, and ongoing assessment of information systems.
Execute on-site work as needed during incidents and may require CONUS/OCONUS travel to customer sites.
Perform the following key tasks:
- Serve as the ISSO in support of the ISO for assigned systems, ensuring full compliance with RMF, DoDI 8510.01, and NIST SP 800‑53 security control baselines.
- Manage and maintain all RMF-related documentation including System Security Plans, Security Assessment Reports, Risk Assessment Reports, and Plan of Action & Milestones.
- Conduct security control assessments and facilitate ongoing authorization (ATO/ATC) activities.
- Work directly with system owners, administrators, and the Government cybersecurity team to ensure all security controls are properly implemented and documented.
- Coordinate and support all phases of the RMF lifecycle from categorization to continuous monitoring.
- Lead vulnerability and compliance assessments using automated tools (e.g., ACAS, STIG Viewer) and ensure findings are remediated or tracked via POA&Ms.
- Participate in Configuration Control Boards and validate that system changes do not negatively impact security controls or the authorization boundary.
- Track and report on system compliance metrics, ensuring timely updates to APMS and eMASS and supporting audit readiness activities.
- Develop and deliver security awareness training, user role validation, and account recertification in accordance with policy.
- Act as liaison with Authorizing Officials, Control Assessors, and NETCOM to facilitate ATO packages and compliance reviews.
- Monitor and analyze security events from SIEM platforms, firewalls, IDS/IPS, and EDR tools to detect threats and abnormal activity.
- Support incident response activities and coordinate with local defender to assess impact, containment, and recovery actions.
- Document all security incidents in alignment with incident handling procedures and provide after‑action reports for leadership.
- Ensure that incident findings are mapped back to RMF controls, and that system documentation is updated accordingly.
- Monitor Cyber Tasking Orders, security bulletins, CVEs, and threat intelligence feeds for relevance to the operational environment.
- Analyze potential threat vectors and adversary TTPs using frameworks such as MITRE ATT&CK and translate findings into actionable security enhancements.
- Collaborate with stakeholders to recommend technical and policy‑based countermeasures aligned with organizational risk tolerance and mission impact.
- Prepare detailed risk assessment reports, compliance dashboards, and security briefings for senior leadership and stakeholders.
- Submit timely updates and artifacts to eMASS and participate in regular cybersecurity status meetings.
- Provide clear, data‑driven recommendations for improving system security postures and addressing identified risks.
- Coordinate with mission owners and developers to implement security in system…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).