← Back to jobs

Information System Security Officer (ISSO)

Kratos Defense & Security Solutions
FULL_TIME Remote · US White Sands, NM, US Posted: 2026-05-11 Until: 2026-06-10
Apply Now →
You will be redirected to the original job posting on BeBee.
Apply directly with the employer.
Job Description
Job Descriptions 5-D Systems, Inc. a KRATOS company, is seeking a highly motivated candidate to fill an ISSO position at WSMR. The WSMR ISSO will support an Army Project Office providing ISSO support to an Army Test Team. The ISSO will be a key member of a team performing Hardware and Software Cybersecurity analysis along with key functions supporting the Risk Management Framework (RMF) Assessment and Authorization (A&A) process for data processing, test, and tactical systems. Duties include, but are not limited to: Provide accurate technical evaluations of the equipment, software applications, full systems, or network and documenting the security posture, capabilities, and vulnerabilities against applicable NIST controls. Selecting and assessing security controls, timely completion of accreditation packages, formulating and implementing mitigations and maintaining the security posture of systems. Must have experience with eMASS and initiating, updating, and maintaining RMF packages. Identify, assess, make risk mitigation recommendations, and document system security threats/risks throughout a system’s lifecycle; validate system security requirements; formulate and maintain documentation and system certification and accreditation activities (planning, testing, assessing and coordinating). Ability to work with system developer to update, maintain, and track RMF and POA&M documentation. Documenting preliminary or residual security risks for system operation and manage and approve Authorization Packages. Monitoring and evaluating a system's compliance with Department of Defense (DoD) security, resilience, and dependability requirements including performing validation steps, comparing actual results with expected results, and analyzing the differences to identify impacts and risks at the software application, system, and network