Information System Security Officer (ISSO)
Redhorse Corporation | |
United States, Virginia, Fort Belvoir | |
May 05, 2026 | |
|
About the Organization
Now is a great time to join Redhorse Corporation. We are a solution-driven company delivering data insights and technology solutions to customers with missions critical to U.S. national interests. We're looking for thoughtful, skilled professionals who thrive as trusted partners building technology-agnostic solutions and want to apply their talents supporting customers with difficult and important mission sets. About the Role Key Responsibilities Perform the duties of an Information System Security Officer (ISSO) as defined in AR 25-2, DA 25-2-14, and the NIST SP 800-53 security controls when the organizationally-defined personnel includes the ISSO Actively manages the organization's eMASS records which includes but is not limited to: Validates security controls including associated artifacts Assesses security scan results and STIGs as required Performs POA&M updates, tracking, and resolution Leads the continuous monitoring activities of the organization Manages the day-to-day activities and the professional development of the Cybersecurity Analysts Collaborates with the O-ISSM on all assessment and authorization activities to ensure the information systems maintain an authority to operate (ATO) on all applicable DoD/IC networks Maintain up-to-date status on all assigned systems and communicate status to the Government leads Maintain complete records of communications, submit written status reports as required, perform peer-review as directed, and attend weekly meetings Correspond with the Government customer and system administrators to communicate any unacceptable risks identified and correct deficient POA&M items to meet DoD and IC standards Coordinate with the Security Control Assessor (SCA) to perform analysis of the overall risk level the system poses to enterprise networks and to mission data Create and maintain cybersecurity policies and standards Ensure that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with cybersecurity standards Ensures security scans and STIG checklists are updated according to DA G2 policy Produces actionable, risk-based reports on security assessment results Assists with vulnerability remediation when necessary Develops and maintains security plans and security testing plans Periodically updates and improves risk models; metrics; reports; processes; and activities to stay compliant with evolving DoD and IC standards Ensures the user community understands and adheres to necessary procedures to maintain security posture of the information systems Provides guidance in the creation and maintenance of Standard Operating Procedures (SOPs); Tactics, Techniques, and Procedures (TTPs); and other similar documentation
10 years' experience as an ISSO on Army Intel programs 2 years' experience with AC2SP tenant assessment and accreditation activities Redhorse Corporation is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status, disability, or any other protected class.
Accommodations:
If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation if you are unable or limited in your ability to access job openings or apply for a job on this site as a result of your disability. You can request reasonable accommodations by contacting Talent Acquisition at Talent-Acquisition@redhorsecorp.com
Redhorse Corporation shall, in its discretion, modify or adjust the position to meet Redhorse's changing needs.
This job description is not a contract and may be adjusted as deemed appropriate in Redhorse's sole discretion.
| |
May 05, 2026