Information Systems Security Officer (ISSO)
6314 Remote/Teleworker US, United States
Full Time Mid-level / Intermediate Clearance required USD 85K - 153K
Looking for an exciting opportunity to make an impact as an Information Systems Security Officer (ISSO)? Leidos is looking for an ISSO for a primarily hybrid position supporting the Federal Trade Commission (FTC) Task Order 4 (TO-4) program. This position shall have detail knowledge and expertise required to manage the overall security aspect of Information System including policies, processes, procedures, laws and regulations; create, document and implement various security plans and continuous monitoring documents to enforce Information Assurance principles.
Primary Responsibilities:
Work closely with the Information Systems Security Manager (ISSM) and SO to drive information assurance initiatives, including security authorization activities, compliance with Risk Management Framework (RMF) policies, and the development of System Security Plans (SSPs).
Perform risk analysis for system changes, contribute to the Risk Management Framework process, and recommend security solutions to address any identified gaps. Create and review documentation to support Systems Security Plans (SSPs), Risk Assessment Reports
Partner with government customers to support Continuous Monitoring (ConMon) activities and ensure timely vulnerability remediation.
As the Information Systems Security Officer (ISSO) the individual will work closely with Government Agency and Offices to generate and maintain security documentation to include System Security Plans, Risk Assessment Reports, Privileged/General User Access Review, and Plan of Action and Milestones (POAM) for Controlled Unclassified Information Systems.
Coordinate with relevant stakeholders to achieve and maintain the information systems' compliance and ATOs/ATUs.
Provide a high level of support for internal/external audit, CISA/DHS Data calls and Metrix
Develop, coordinate, test, and train staff/contractors on Contingency Plans (CP) and Disaster Recovery Plans (DRP).
Maintain operational security posture for an information system or program to ensure information systems security design, implementation, implementation, implementation, management and review of policies, standards, baselines, procedures, and guidelines are established and followed.
Identify, manage, and monitor POA&Ms, work with various teams and stakeholders to close POAMs in a timely manner. Provide guidance through remediation as well as develop corrective action plans for each POA&Ms.
Provide configuration management (CM) for information system security software, hardware, and firmware; manage changes to system and assess the security impact of those changes.
Work with multiple teams and client project team members and establish and maintain a strong customer-focused working relationship. Assist the System Owner operate the system as securely as possible to fulfill mission requirements.
Reviewing operating system, application, and database security baseline configuration documentation to ensure compliance with agency hardening guidelines.
Reviewing proposed change requests related to system design / configuration and performing a security impact analysis to provide approval or denial recommendations
Reviewing vulnerability scan results, risk-based prioritization to mitigate the vulnerabilities and provide the overall risk exposure to ISSM and SO
Basic Qualifications:
Active Certified Information Systems Security Professional (CISSP) certification.
Bachelor’s degree (or equivalent) and 4+ years of relevant experience.
Minimum 3 years’ experience working as ISSO for FISMA and FEDRAMP systems
Demonstrated experience with the Risk Management Framework (RMF), Federal Information Security Management Act (FISMA), FEDRAMP and National Institute of Standards and Technology (NIST) Special Publications including NIST 800-171, NIST 800-53, SP 800-34, SP 800-137, FIPS 199/200.
Superior writing, communication, and critical analysis skills, must be comfortable in customer facing role and maintaining customer relationship
Ability to work independently and as part of the team during the customer’s business hours
Deep understanding of Information Assurance, Information Technology and Information Management concepts, processes and procedures.
Hands-on experience supporting vulnerability management program, track and reporting vuln mitigation plan with stakeholders
Must be a US Citizen and able to obtain and maintain a Public Trust security clearance.
Preferred Qualifications:
Knowledge of various security tools, including vulnerability scanning, CSAM, Application whitelisting, Privileged Access Management
Operating knowledge of Windows/Linux operating systems, network devices, firewalls, TCP/IP ports and protocols and cloud security.
Experience with CIS/STIG security benchmarks
In 2025, Leidos was ranked as one of the “World's Most Ethical Companies” by the Ethisphere Institute for the eight consecutive year.
Original Posting:
April 28, 2025For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $85,150.00 - $153,925.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Tags: CISA CISSP Clearance Cloud Compliance FedRAMP Firewalls FISMA Government agency Linux Monitoring NIST NIST 800-53 POA&M Risk analysis Risk assessment Risk Assessment Report Risk management RMF Security Clearance Security Impact Analysis System Security Plan TCP/IP Vulnerabilities Vulnerability management Windows
Perks/benefits: Equity / stock options
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.