We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

Information Systems Security Officer

Metronome, LLC
401(k), remote work
United States, Virginia, Fairfax
11216 Waples Mill Road (Show on map)
Mar 07, 2025

Job Title: Information Security Systems Specialist

Location: Annapolis Junction, MD; Elkridge, MD

Status: On site

Employment Type: Full-Time

Clearance Level: TS/SCI ***will need to complete CI poly before starting. WE WILL SPONSOR***

Education:

14+ years of professional experience with a Bachelor's degree or equivalent

12+ years of professional experience with a Master's degree or equivalent

10+ years of professional experience with a PhD or equivalent

Additional experience will be considered in lieu of a degree

Benefits: Competitive salary and bonus structure, Comprehensive health insurance, 401(k) with company match, Generous PTO and remote work options.

Salary: $76,000-91,000

Application: apply here, or on our Careers Page @ Careers - Metronome (wearemetronome.com), email your resume to r.derring@wearemetronome.com

Feel free Recommend this job and share the job with a friend

Description:

As a Senior Information Systems Security Officer you will be responsible for safeguarding an organization's computer networks and systems to the highest standards. The primary focus is on ensuring the security, integrity, and confidentiality of data within these systems.

Responsibilities of this role include:

  • Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements.
  • Analyzes architecture and system functionality for multiple technologies.
  • Contributes to the development and evaluation of attack scenarios.
  • Prepares and delivers technical reports and briefings.
  • Has a complete understanding of Risk Management Framework and how to implement the process on program systems/networks.
  • Performs, or reviews, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established IA standards and regulations, and recommend mitigation strategies.
  • Validates and verifies system security requirements definitions and analysis and establishes system security designs.
  • Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application security policy and enterprise solutions.
  • Supports the building of security architectures.
  • Enforces the design and implementation of trusted relations among external systems and architectures.
  • Assess' and mitigates system security threats/risks throughout the program life cycle.
  • Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations.
  • Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content.
  • Performs system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of operational IA and CND systems.
  • Performs limited penetration testing and routine exploit analysis.
  • Performs system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements.
  • Recommends system-level solutions to resolve security requirements.
  • Supports the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures.
  • Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements.
  • Analyzes architecture and system functionality for multiple technologies.
  • Contributes to the development and evaluation of attack scenarios.
  • Prepares and delivers technical reports and briefings.
  • Has a complete understanding of Risk Management Framework and how to implement the process on program systems/networks.
  • Performs, or reviews, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established IA standards and regulations, and recommend mitigation strategies.
  • Validates and verifies system security requirements definitions and analysis and establishes system security designs.
  • Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application security policy and enterprise solutions.
  • Supports the building of security architectures.
  • Enforces the design and implementation of trusted relations among external systems and architectures.
  • Assess' and mitigates system security threats/risks throughout the program life cycle.
  • Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking operations.
  • Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content.
  • Performs system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of operational IA and CND systems.
  • Performs limited penetration testing and routine exploit analysis.
  • Performs system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements.
  • Recommends system-level solutions to resolve security requirements.
  • Supports the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures.

Required Skills:

  • Working with the application leads, sysadmins, dbas, developers and testers to ensure the assigned systems are security compliant and achieve/maintain ATO.
  • Active Top Secret/SCI Clearance with a Polygraph
  • Loading artifacts such as STIG checklists and ACAS scans.
  • Helping to implement STIG checklists and mitigate scan findings.
  • Answering questions to ensure systems are developed with security compliance built in.
  • Supporting security assessment events and responding to all questions from PAT team, ISSMs and SCA
  • Experience working with Xacta
Applied = 0

(web-b798c7cf6-z2v8z)