Information Security Officer at Specialty Systems supporting cybersecurity for Navy systems. Role involves RMF implementation, vulnerability management, and collaboration with technical teams.
Responsibilities
Support implementation of the DoD Risk Management Framework (RMF) process for Navy information systems.
Assist in development and maintenance of RMF documentation.
Assist with system categorization, control selection, and implementation validation in accordance with NIST SP 800-53.
Coordinate with Authorizing Officials (AO), ISSMs, ISSOs, and system owners to support ATO packages.
Monitor cybersecurity vulnerabilities and assist with remediation planning.
Track vulnerabilities and corrective actions through POA&M management.
Assist with enforcement of DoD and Navy cybersecurity policies.
Develop and update software requirements, design documents, and test procedures.
Working closely with system administrators, developers, and network engineers to implement cybersecurity controls.
Requirements
A BS/BA degree in Computer Science, Software Engineering, Electrical Engineering, or a related STEM field is preferred.
Equivalent work experience is acceptable in lieu of a degree.
Must have a Secret level or higher clearance or be able to obtain a Secret Clearance.
Must have at least 3 or more years’ experience cybersecurity or information assurance experience supporting DoD or federal systems.
Security+ CE or the ability to obtain certification within 3-6 months.
Must achieve CWF status.
Experience supporting DoD Risk Management Framework (RMF) activities.
Knowledge of NIST SP 800-53 security controls and DoD cybersecurity policies.
Experience with vulnerability scanning tools (ACAS/Nessus) and STIG implementation.
Familiarity with cybersecurity documentation required for ATO packages.
Experience supporting DevSecOps environments.
Experience with both containerized and virtualized environments.
Understanding of continuous monitoring and cyber readiness reporting.
Individuals should be self-starters able to work with little supervision to support cybersecurity compliance.
Must be able to work collaboratively within a multi-disciplinary team.
Designer developing comprehensive application solutions for security systems at Johnson Controls. Collaborating on technical sales support and large - scale integrated electronic security systems.
Analyst role supporting Epic Security & Configuration at Acrisure, ensuring application functionality and troubleshooting issues. Collaborating with teams for configuration and security in Applied Epic systems.
Security Detection & Response Engineer for Flutter Entertainment developing security detection frameworks. Collaborating with global teams to enhance cybersecurity operations in complex, multi - cloud environments.
Specialist Software Design Verification Engineer in Cybersecurity at Solventum. Responsible for software verification, testing processes, and compliance with medical device regulations.
Lead defensive threat research on generative and agentic AI systems at RBC. Identify emerging threats and develop proof - of - concept exploits to enhance AI security.
Entry - level role in information security at Applied Materials, managing technologies and assisting in compliance with security standards. Contributing to the development of awareness and training.
Staff Software Engineer designing and implementing identity, authentication, and authorization for agentic AI ecosystems at Walmart. Leading secure architecture and engineering excellence for non - human identities.
IT Consultant specializing in Security Engineering, working on national and international IT Security projects. Responsible for identifying security vulnerabilities and assisting customers' Security Management.
IT Info Security Specialist managing ERIE's information security program to protect digital assets. Collaborating with various teams to enforce security measures and resolve identity access issues.
CISA Auditor Cyber Security at an international bank, planning and conducting IT audit examinations, focusing on cyber threats. Requires IT auditing experience and a Master in Information Systems or Engineering.