Job Requirements
Fort Belvoir, VA
Top Secret/SCI Polygraph Unspecified
Career Level not specified
Salary not specified
Join Premium to unlock estimated salaries
Job Description
About the Organization
Now is a great time to join Redhorse Corporation. We are a solution-driven company delivering data insights and technology solutions to customers with missions critical to U.S. national interests. We're looking for thoughtful, skilled professionals who thrive as trusted partners building technology-agnostic solutions and want to apply their talents supporting customers with difficult and important mission sets.
About the Role
Redhorse transforms the way government uses data and technology. To support this mission, we are seeking a highly skilled Information System Security Officer (ISSO) to support the Army INSCOM G-6 at Fort Belvoir, VA. In this critical role, you will be responsible for the overall security posture of complex information systems, ensuring compliance with stringent DoD and NIST guidelines.
You will lead a team of cybersecurity professionals, directly impacting the security of sensitive national security systems and enabling the Army's Intelligence Enterprise to operate securely in a contested digital landscape. This position offers the opportunity to work on high-impact projects where your expertise in risk management and authorization (ATO) directly protects mission-critical data.
Key Responsibilities
Required Experience/Clearance
Desired Experience
Redhorse Corporation is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status, disability, or any other protected class.
Accommodations:
If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation if you are unable or limited in your ability to access job openings or apply for a job on this site as a result of your disability. You can request reasonable accommodations by contacting Talent Acquisition at [email protected]
Redhorse Corporation shall, in its discretion, modify or adjust the position to meet Redhorse's changing needs.
This job description is not a contract and may be adjusted as deemed appropriate in Redhorse's sole discretion.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Now is a great time to join Redhorse Corporation. We are a solution-driven company delivering data insights and technology solutions to customers with missions critical to U.S. national interests. We're looking for thoughtful, skilled professionals who thrive as trusted partners building technology-agnostic solutions and want to apply their talents supporting customers with difficult and important mission sets.
About the Role
Redhorse transforms the way government uses data and technology. To support this mission, we are seeking a highly skilled Information System Security Officer (ISSO) to support the Army INSCOM G-6 at Fort Belvoir, VA. In this critical role, you will be responsible for the overall security posture of complex information systems, ensuring compliance with stringent DoD and NIST guidelines.
You will lead a team of cybersecurity professionals, directly impacting the security of sensitive national security systems and enabling the Army's Intelligence Enterprise to operate securely in a contested digital landscape. This position offers the opportunity to work on high-impact projects where your expertise in risk management and authorization (ATO) directly protects mission-critical data.
Key Responsibilities
- Oversee the security of information systems, ensuring strict compliance with DoD and NIST guidelines, including AR 25-2, DA 25-2-14, and NIST SP 800-53.
- Manage and maintain eMASS records, validate security controls, assess vulnerability scan results, and track Plan of Action and Milestones (POA&M) progress.
- Lead ongoing continuous monitoring efforts to maintain system security and compliance, identifying and mitigating risks proactively.
- Manage the daily activities, tasking, and professional development of a team of Cybersecurity Analysts.
- Collaborate with the Organization Information System Security Manager (O-ISSM) to achieve and maintain Authorization to Operate (ATO) for systems on DoD/IC networks.
- Provide regular status reporting and risk briefings to government leads, promptly addressing emerging security issues.
- Coordinate with Security Control Assessors (SCA) to conduct comprehensive risk assessments of systems and their impact on networks and mission data.
- Develop and maintain robust cybersecurity policies, procedures, and documentation, including Standard Operating Procedures (SOPs) and Tactics, Techniques, and Procedures (TTPs).
Required Experience/Clearance
- Active Top Secret (TS) security clearance with eligibility for Sensitive Compartmented Information (SCI) and NATO access prior to starting work.
- Must meet DoD 8140 / 8570.01-m requirements for a privileged user on TS/SCI systems (e.g., IAT II/III or IAM II/III) prior to start.
- Education & Experience Tiers:
- Bachelor's degree in a STEM field + 12+ years of cybersecurity experience; OR
- Master's degree in a STEM field + 10+ years of cybersecurity experience; OR
- PhD in a STEM field + 8+ years of cybersecurity experience.
- 10+ years of experience validating system security controls and managing vulnerabilities.
- 8+ years of experience with the Risk Management Framework (RMF) and eMASS.
- 5+ years of experience tracking and resolving POA&Ms.
- 3+ years of experience performing continuous monitoring.
Desired Experience
- Deep familiarity with DISA Security Technical Implementation Guides (STIGs) and Security Requirement Guides (SRGs).
- Experience leading cybersecurity teams on large-scale Department of Defense contracts.
- Hands-on experience with modern collaboration and data tools such as DataBricks, GitLab, or Jira.
- Advanced professional certifications such as CISSP, CISM, or GSLC.
- Experience implementing or assessing security architectures within cloud environments (AWS, Azure, or GovCloud).
Redhorse Corporation is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on the basis of race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status, disability, or any other protected class.
Accommodations:
If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation if you are unable or limited in your ability to access job openings or apply for a job on this site as a result of your disability. You can request reasonable accommodations by contacting Talent Acquisition at [email protected]
Redhorse Corporation shall, in its discretion, modify or adjust the position to meet Redhorse's changing needs.
This job description is not a contract and may be adjusted as deemed appropriate in Redhorse's sole discretion.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
group id: 10429745