- Home
- »All Job Categories
- »Security Jobs
Auto-apply to these security jobs
We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

Posted 30+ days ago

$14 - $15 / hour
Posted today

$24+ / hour
Posted today

$49,000 - $69,000 / year
Posted 30+ days ago
Posted 30+ days ago

$16 - $23 / hour
Posted 1 week ago

$180,000 - $230,000 / year
Posted 30+ days ago
Posted 30+ days ago

$20 - $24 / hour
Posted 3 weeks ago

$103,700 - $193,750 / year
Posted 30+ days ago

$23 - $33 / hour
Posted 3 days ago

$25 - $35 / hour
Posted 30+ days ago
Posted 1 week ago

$130,000 - $150,000 / year
Posted 30+ days ago

Posted 3 days ago

Posted 30+ days ago

Posted 3 weeks ago

$110,000 - $140,000 / year
Posted 30+ days ago

$30+ / hour
Posted 30+ days ago

$120,000 - $160,000 / year
Posted 30+ days ago

Information Systems Security Officer 2
Automate your job search with Sonara.
Submit 10x as many applications with less effort than one manual application.1
Reclaim your time by letting our AI handle the grunt work of job searching.
We continuously scan millions of openings to find your top matches.

Job Description
Responsibilities
- Support a program, organization, system, or enclave's information assurance program.
- Support proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
- Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed.
- Assist with managing security aspects of the information system and performing day-to-day security operations.
- Evaluate security solutions to ensure they meet security requirements for processing classified information.
- Perform vulnerability/risk assessment analysis to support security authorization.
- Provide configuration management (CM) for information systems security software, hardware, and firmware.
- Manage changes to the system and assess the security impact of those changes.
- Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs).
- Support security authorization activities in compliance with the National Institute of Standards and Technology Risk Management Framework (NIST RMF).
Minimum Qualifications
- Eight (8) years of combined work-related experience in IT, cybersecurity or security authorization is required.
- Experience in at least two areas is required: current security tools, hardware/software security implementation, communication protocols, or encryption tools and techniques.
- Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
- Bachelor's degree in Computer Science, Cyber Security or IT Engineering is required. Four additional years of work-related experience may be substituted for a bachelor's degree.
- Required Certifications (one or more): CAP, CND, Cloud+, GSLC, Security+ CE, HCISPP
Required Capabilities
- Provide support to senior ISSOs for implementing and enforcing information systems security policies, standards, and methodologies
- Assist with the preparation and maintenance of documentation
- Assist in evaluating security solutions to ensure they meet security requirements for processing classified information.
- Assist with Configuration Management (CM) for information system security software, hardware, and firmware.
- Maintain records on workstations, servers, routers, firewalls, intelligent hubs, network switches, etc., including system upgrades.
- Propose, coordinate, and implement information systems security policies, standards, and methodologies.
- Develop and maintain documentation for Security Authorization by ODNI and DoD policies.
- Provide CM for security-relevant information system software, hardware, and firmware.
- Ensure compliance with the system security policy.
- Evaluate security solutions to ensure they meet security requirements for processing classified information.
- Maintain operational security posture for an information system or program
- Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave
- Develop and update the system security plan and other Cybersecurity documentation
- Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
- Track and ensure appropriate user identification and authentication mechanism of the Information System (IS)
- Obtain system authorization for ISs under their purview
- Provide support for a program, organization, system, or enclave's information assurance program
- Plan and coordinate implementation of IT security programs and policies
- Manage and control changes to the system, assessing the security impact of those changes
- Provide daily oversight and direction to contractor ISSOs
- Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives
Automate your job search with Sonara.
Submit 10x as many applications with less effort than one manual application.
