Independent Software

Information Systems Security Officer, Level 1 (ISSO)

Information Assurance - Columbia, MD - Full Time

What you will be doing:

As an Information Systems Security Officer Level 1 you will be responsible for supporting and maintaining the security posture of classified and sensitive government information systems. You will assist in implementing and monitoring security controls in accordance with the NIST Risk Management Framework (RMF), DoD, and Intelligence Community (IC) policies and standards.

In this role, you will perform hands on security operations supporting Assessment and Authorization (A&A) activities, conducting risk and vulnerability assessments, and ensuring that systems remain compliant throughout their lifecycle. You will work closely with system administrators, engineers, and security managers to document, enforce, and continuously improve the organization’s information assurance posture.

This position is ideal for a motivated cybersecurity professional eager to contribute to mission success by ensuring the confidentiality, integrity, and availability of critical systems in a high impact, secure environment.


Key Responsibilities:

  • Provide cybersecurity support for programs, systems, or organizational enclaves
  • Develop, implement, and enforce IT security policies and methodologies
  • Maintain the operational security posture of systems under your purview
  • Coordinate and manage security authorization processes (A&A)
  • Prepare and maintain documentation including SSPs, SCTMs, POA&Ms, and Risk Assessments
  • Evaluate and implement security controls to meet NIST, DoD, and IC requirements
  • Perform and document vulnerability/risk assessments and baseline evaluations
  • Support configuration management and assess security impact of system changes
  • Initiate reauthorization or decommissioning processes as needed
  • Track and close out security liens and respond to IAVAs
  • Recognize, report, and respond to cybersecurity incidents and violations
  • Conduct audit log reviews and continuous monitoring activities
  • Deliver security awareness training and provide ongoing compliance oversight
  • Collaborate with system/network admins to document data flow and system architecture
  • Lead and support corrective actions when vulnerabilities are discovered
  • Maintain system compliance through ongoing assessment and remediation
Required Skills & Qualifications:
  • Strong understanding of the NIST Risk Management Framework (RMF)
  • Familiarity with security tools, encryption technologies, and communication protocols
  • Knowledge of applicable IA policies, controls, and continuous monitoring strategies
  • Ability to lead system authorization activities and manage security documentation
  • Experience in audit log analysis and vulnerability management
  • Excellent verbal and written communication skills
  • Self-starter with strong problem-solving, leadership, and teamwork skills
  • Availability to respond to after-hours requests in a 24/7 support environment
Education and Experience:
  • Bachelor’s degree in Computer Science, Information Technology, or a related discipline from an accredited college or university
  • Five (5) years of experience as an ISSO supporting systems of similar scope, type, and complexity
  • Four (4) years of additional ISSO experience may substitute for the required degree
Clearance Requirement:
  • Must possess an active TS/SCI with appropriate Polygraph to be considered for this role

Why Choose Independent Software:

At Independent Software, our people are the mission. We’ve built a company around collaboration, integrity, and innovation and we make sure our team has the tools and support to grow, succeed, and thrive.
When you join us, you will:
  • Support critical national security missions that matter
  • Be part of a close-knit, employee-first culture where your voice is heard
  • Expand your skills through ongoing training, mentorship, and career development
  • Enjoy competitive compensation, generous benefits, and work-life balance

Ready to take the next step in your career? Join us and be part of something bigger.

Apply today.


We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.


 
Apply: Information Systems Security Officer, Level 1 (ISSO)
* Required fields
First name*
Last name*
Email address*
Location *
Phone number*
Resume*

Attach resume as .pdf, .doc, .docx, .odt, .txt, or .rtf (limit 5MB) or paste resume

Paste your resume here or attach resume file

Cover Letter
Who referred you to this position? Enter their first and last name here.
What’s your citizenship / employment eligibility?*
What’s your highest level of education completed?*
College or University
LinkedInLinkedIn profile URL:
Desired salary
Earliest start date?
Do you possess an active and current TS/ SCI clearance?*
Do you possess an active and current Polygraph?*
If yes, what agency conducted the polygraph?*
ow many years of ISSO or related cybersecurity experience do you have?*
How familiar are you with the NIST Risk Management Framework (RMF)?*
Which RMF step(s) have you personally supported or led? (Check all that apply)*
Have you prepared or maintained system authorization documentation (SSP, POA&M, Risk Assessment)?*
Check all certification that your currently have that are valid.*
Please list any other valid certifications you posses not listed that may be relevant to this position.
How familiar are you with DoD and IC cybersecurity policies (e.g., DoDI 8510.01, CNSSI 1253, ICD 503)?*
Which security control families from NIST SP 800-53 are you most confident working with? (Check all that apply)*
Have you supported any DoD or Intelligence Community system authorizations? (Check all that apply)*
List cybersecurity tools or technologies have you used in previous ISSO or IA roles?*
Have you reviewed audit logs or supported incident response activities?*
How comfortable are you communicating security risks and compliance requirements to non-technical stakeholders?*
Human Check*