×
Register Here to Apply for Jobs or Post Jobs. X

Information Systems Security Officer; ISSO II

Job in Tucson, Pima County, Arizona, 85718, USA
Listing for: General Dynamics Information Technology
Full Time position
Listed on 2026-01-17
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below
Position: Information Systems Security Officer (ISSO) II

Overview

Req : RQ213001

Type of Requisition: Regular

Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph

Public Trust/Other

Required:

None

Job Family: Cyber and IT Risk Management

Skills: Cybersecurity, Information Assurance, Security Operations, System Security

Certifications: CompTIA Server+ - IAT Level II - CompTIA - CompTIA

Experience: 5 + years of related experience

US Citizenship

Required:

Yes

Job Description: Senior Information Security Analyst (level II)

Transform technology into opportunity as an Senior Information Security Analyst II with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you’ll be at the forefront of innovation and play a meaningful part in improving how agencies operate.

At GDIT, people are our differentiator. As an Senior Information Security Analyst II you will help ensure today is safe and tomorrow is smarter. Our work depends on Senior Information Security Analyst joining our team to help keep networks/systems secure and safe.

Responsibilities
  • Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction
  • The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO.
  • The person chosen shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, as in many organizations, is assigned responsibility for the day-to-day security operations of a system.
  • This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries.
  • This will include assessing the security impact of those changes and making recommendation to the ISSM.
  • The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts.
  • The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include
  • Assist the ISSM in meeting their duties and responsibilities
  • Prepare, review, and update authorization packages
  • Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
  • Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
  • Conduct periodic reviews of information systems to ensure compliance with the security authorization package
  • Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
  • Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
  • Ensure all IS security-related documentation is current and accessible to properly authorized individuals
  • Ensure audit records are collected, reviewed, and documented (to include any anomalies)
  • Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
  • Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
  • Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
  • Prepare reports on the status of security safeguards applied to computer systems
  • Perform ISSO duties in support of in-house and external customers
  • Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries.
Qualifications & Experience
  • 5-7 years related experience, especially…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary