Information Systems Secuity Officer (ISSO) -43947 at Syneren Technologies Corporation
Washington, District of Columbia, USA -
Full Time


Start Date

Immediate

Expiry Date

30 Nov, 25

Salary

0.0

Posted On

31 Aug, 25

Experience

7 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Good communication skills

Industry

Information Technology/IT

Description

Job Title: Information Systems Security Officer (ISSO)
Job Location: Washington, DC (Onsite)
Job Description:
Syneren is seeking a skilled and visionary Information Systems Security Officer (ISSO) is responsible for the implementation, management, and oversight of cybersecurity policies and procedures to protect the organization’s information systems. This role ensures compliance with federal regulations, industry standards, and internal security protocols, while proactively identifying and mitigating risks.
Company Overview
Syneren Technologies Corporation has expertise in operating, maintaining, and modernizing applications and IT systems for the Federal Government. We provide scientific and engineering expertise for critical agency missions. Our goal is to be at the forefront of change so that we can bring the best ideas to fruition for our clients’ missions.
Mission & Vision
To be the leading provider of enduring systems engineering and software solutions, delivering measurable results, exceeding customer expectations, and fostering a workplace that promotes continuous growth and empowers employees to thrive, while enabling the missions of our customers and partners with high-quality products and services that lead to 100% satisfaction.
Summary of the Position
The Information Security Systems Officer (ISSO) is responsible for ensuring the security of an organization’s information systems by implementing and maintaining cybersecurity policies, procedures, and controls. This role involves monitoring systems, conducting risk assessments, and ensuring compliance with federal and industry regulations to protect sensitive data and infrastructure.

Essential Job Duties

  • Security Policy Development & Enforcement
  • Create, implement, and maintain cybersecurity policies and procedures
  • Ensure alignment with organizational goals and regulatory requirements
  • Regularly update policies to reflect evolving threats and technologies
  1. Risk Assessment & Threat Analysis
  • Conduct regular vulnerability assessments
  • Analyze potential threats and recommend mitigation strategies
  • Perform risk assessments to identify and prioritize security risks
  • Understanding of common, vulnerabilities and exposures (CVEs) and CISA Known Exploited Vulnerabilities (KEVs)
  1. Auditing & Compliance
  • Perform regular security audits to ensure compliance with internal and external standards (e.g., NIST, RMF)
  • Maintain documentation of security policies, procedures, and incident reports
  • Collaborate with engineers, system admins and compliance teams to meet regulatory requirements

Minimum Qualifications:

  • Bachelor’s degree in IT-related field or at least 4 additional years of IT work experience
  • 7+ years of relevant experience
  • IAT Level I certificatio

Physical Requirements:

  • Prolonged periods in stationary position at a desk and working on a computer.
  • Must be able to lift up to 15 pounds at times.
  • The person in this position needs to occasionally move throughout the office, including across longer distances such as from the building entrance to the workspace
Responsibilities

NON-ESSENTIAL DUTIES:

Responsibilities:

  1. Security Policy & Procedure Management
  • Implement and maintain cybersecurity policies and procedures
  • Ensure alignment with organizational goals and regulatory standards
  • Regularly review and update documentation to reflect evolving threats
  • Risk Assessment & Mitigation
  • Conduct system risk assessments
  • Identify potential threats and recommend mitigation strategies
  • Track and report on risk posture across systems and applications
  • Compliance & Regulatory Oversight
  • Ensure systems comply with frameworks like NIST RMF, FISMA, FedRAMP, HIPAA, or ISO 27001
  • Support the Authorization & Accreditation (A&A) process
  • Maintain documentation for assessments, and security controls
  • Security Control Implementation
  • Oversee deployment of technical controls (e.g., firewalls, access controls, encryption)
  • Monitor and evaluate effectiveness of security tools and configurations
  • Collaborate with system owners and IT teams to integrate security into system design

Minimum Qualifications:

  • Bachelor’s degree in IT-related field or at least 4 additional years of IT work experience
  • 7+ years of relevant experience
  • IAT Level I certification

Working Conditions

  • Standard office environment.
  • May require extended hours during project deadlines or system implementations.

Physical Requirements:

  • Prolonged periods in stationary position at a desk and working on a computer.
  • Must be able to lift up to 15 pounds at times.
  • The person in this position needs to occasionally move throughout the office, including across longer distances such as from the building entrance to the workspace.

Disclaimer
This job description is intended to describe the general nature and level of work performed. It is not an exhaustive list of all responsibilities, duties, and skills required.
ADA Compliance: Reasonable accommodations may be made to enable individuals with disabilities to perform essential functions.
EEO-1 Statement: We are an Equal Opportunity Employer and do not discriminate based on race, color, religion, sex, national origin, age, disability, or genetic information.
E-Verify Participation: This employer participates in E-Verify to confirm the eligibility of all newly hired employees to work in the United States

Essential Job Duties

  • Security Policy Development & Enforcement
  • Create, implement, and maintain cybersecurity policies and procedures
  • Ensure alignment with organizational goals and regulatory requirements
  • Regularly update policies to reflect evolving threats and technologie
Loading...