×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity Analyst – ISSO​/Threat & SOC Monitoring

Job in California, Moniteau County, Missouri, 65018, USA
Listing for: PeopleTec, Inc.
Per diem position
Listed on 2026-01-12
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security, Security Manager
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below
Position: Cybersecurity Analyst – ISSO Support / Threat & SOC Monitoring
Location: California

Cybersecurity Analyst – ISSO Support / Threat & SOC Monitoring

Join to apply for the Cybersecurity Analyst – ISSO Support / Threat & SOC Monitoring role at People Tec, Inc.

Overview

People Tec is currently seeking a Cybersecurity Analyst – ISSO Support / Threat & SOC Monitoring to support our Camp Roberts (San Miguel, California) location. The local defender role combines ISSO responsibilities with those of a traditional Security Operations Center (SOC) and a threat analyst. The position is pivotal in maintaining the cybersecurity posture of systems under its purview, supporting system authorization, implementing cybersecurity policies, and ensuring continuous monitoring in accordance with DoD Risk Management Framework (RMF).

The candidate will proactively manage compliance with cybersecurity directives, respond to incidents, and support the Government customer by implementing technical and procedural safeguards aligned with RMF controls. The preferred candidate is an experienced ISSO with in-depth knowledge of NIST 800‑53 controls, the RMF lifecycle, and DoD cybersecurity policies (DoDI 8510.01, 8500.01, AR 25‑2). The role requires the ability to work independently, support system owners, and lead the documentation, authorization, and ongoing assessment of information systems.

Responsibilities

Execute on-site work as needed during incidents and may require CONUS/OCONUS travel to customer sites.

Perform the following key tasks:

  • Serve as the ISSO in support of the ISO for assigned systems, ensuring full compliance with RMF, DoDI 8510.01, and NIST SP 800‑53 security control baselines.
  • Manage and maintain all RMF-related documentation including System Security Plans, Security Assessment Reports, Risk Assessment Reports, and Plan of Action & Milestones.
  • Conduct security control assessments and facilitate ongoing authorization (ATO/ATC) activities.
  • Work directly with system owners, administrators, and the Government cybersecurity team to ensure all security controls are properly implemented and documented.
  • Coordinate and support all phases of the RMF lifecycle from categorization to continuous monitoring.
  • Lead vulnerability and compliance assessments using automated tools (e.g., ACAS, STIG Viewer) and ensure findings are remediated or tracked via POA&Ms.
  • Participate in Configuration Control Boards and validate that system changes do not negatively impact security controls or the authorization boundary.
  • Track and report on system compliance metrics, ensuring timely updates to APMS and eMASS and supporting audit readiness activities.
  • Develop and deliver security awareness training, user role validation, and account recertification in accordance with policy.
  • Act as liaison with Authorizing Officials, Control Assessors, and NETCOM to facilitate ATO packages and compliance reviews.
  • Monitor and analyze security events from SIEM platforms, firewalls, IDS/IPS, and EDR tools to detect threats and abnormal activity.
  • Support incident response activities and coordinate with local defender to assess impact, containment, and recovery actions.
  • Document all security incidents in alignment with incident handling procedures and provide after‑action reports for leadership.
  • Ensure that incident findings are mapped back to RMF controls, and that system documentation is updated accordingly.
  • Monitor Cyber Tasking Orders, security bulletins, CVEs, and threat intelligence feeds for relevance to the operational environment.
  • Analyze potential threat vectors and adversary TTPs using frameworks such as MITRE ATT&CK and translate findings into actionable security enhancements.
  • Collaborate with stakeholders to recommend technical and policy‑based countermeasures aligned with organizational risk tolerance and mission impact.
  • Prepare detailed risk assessment reports, compliance dashboards, and security briefings for senior leadership and stakeholders.
  • Submit timely updates and artifacts to eMASS and participate in regular cybersecurity status meetings.
  • Provide clear, data‑driven recommendations for improving system security postures and addressing identified risks.
  • Coordinate with mission owners and developers to implement security in system…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary