
Information System Security Engineer (ISSE) (2026-0045)
Automate your job search with Sonara.
Submit 10x as many applications with less effort than one manual application.1
Reclaim your time by letting our AI handle the grunt work of job searching.
We continuously scan millions of openings to find your top matches.

Overview
Job Description
ROLES AND RESPONSIBILITIES:
Tasks shall include, but are not limited to, the following:- Develop, implement, and/or integrate Information Assurance (IA) and security systems, including those for networking, computing, virtualization, cloud, and enclave environments, to include those with multiple enclaves and with differing data protection/classification requirements.
- Review and conduct technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (lA) standards and regulations, and recommend mitigation strategies.
- Create and review Assessment and Authorization (A&A) Body of Evidence documentation, and provide feedback on completeness and compliance of its content.
- Advise and assist the Sponsor's customers with the Lifecycle Assessment and Authorization process.
- Ensure all program activities maintain system baselines and configuration management items, including security event monitoring policies, in a manner determined and agreed to by the COTR and the Sponsor's management.
- Ensure changes are made using the Sponsor’s approved cybersecurity approval process and are coordinated and scheduled.
- Maintain appropriate levels of documentation deemed acceptable by Agency regulations and guidelines for each individual project, including operations and maintenance information, operations guides, design documents, scans, and overall concepts of operations.
- Enforce the design and implementation of trusted interfaces among external systems and architectures.
- Utilize COTS/GOTS and custom tools in order to scan, identify, contain, mitigate and remediate vulnerabilities and intrusions.
- Protect information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording and destruction.
- Recognize potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
- Familiarity with Sponsor technical communication systems.
- Levels:
- Senior – Bachelors + 8 years
- Degree substitutions permitted:
- 4 years in lieu of a Bachelors
- 6 years in lieu of a Masters
- TS/SCI with polygraph
- Familiarity with Sponsor technical communication systems.
EQUAL EMPLOYMENT OPPORTUNITY (EEO) STATEMENT
ATS is committed to a program of equal employment opportunity without regard to race, color, ethnicity, national origin, ancestry, citizenship, sex, pregnancy, marital status, sexual orientation, age, religion/creed, hairstyles and hair textures, handicap/disability, genetic information/history, military/veteran status, or any other characteristic or condition protected by applicable law. We support the employment and advancement in employment of individuals with disabilities and of protected veterans, and we treat qualified individuals without discrimination on the basis of their physical or mental disability or veteran status.
Powered by JazzHR
Automate your job search with Sonara.
Submit 10x as many applications with less effort than one manual application.
