Information Systems Security Officer - ONSITE - Government and Public Sector

McLean, VA, US, 22102


EY provides consulting, assurance, tax and transaction services that help solve our client’s toughest challenges and build a better working world for all.

View company page

EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.  At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.  


From strategy to execution, the Government & Public Sector (GPS) practice of Ernst & Young LLP provides a full range of consulting and audit services to help our Federal, State, Local and Education clients implement new ideas to help achieve their mission outcomes. We deliver real change and measurable results through our diverse, high-performing teams, quality work at the highest professional standards, operational know-how from across our global organization, and creative and bold ideas that drive innovation. We enable our government clients to achieve their mission of protecting the nation and serving the people; increasing public safety; improving healthcare for our military, veterans, and citizens; delivering essential public services; and helping those in need. EY is ready to help our government build a better working world.  


Our GPS Technology Organization is a structure within the US GPS practice that implements and maintains a new operate and technology model designed specifically to support U.S. defense and Government engagements. 


The opportunity  


The work office will be in Crystal City, VA.  


As an Information System Security Officer (ISSO), you will be responsible for ensuring the appropriate security posture is maintained for one or more GPS information systems in a classified environment. The ISSO serves as the principal advisor on all matters related to information security of their information systems. This includes planning the appropriate security throughout the lifecycle of the system and ensuring continuous monitoring. 


Specifically, GPS supports NIST SP 800-37 while using appropriate controls and maturity processes from NIST SP 800-53, NIST SP 800-171, and the Dept. of Defense’s (DoD’s) Cybersecurity Maturity Model Certification (CMMC). This includes risk management processes and reporting at the system, customer, and program level. GPS systems must also comply with EY’s security policies and standards. 


Your key responsibilities  


  • Evaluate technical and non-technical security controls to ensure they meet security requirements for processing classified information.
  • Own the planning, monitoring, testing, and updating of system security plans for assigned information systems using guidance from NIST SP 800-53, the National Industrial Security Program Operating Manual (NISPOM), Defense Counterintelligence and  Security Agency Assessment and Authorization Process Manual (DAAPM), and the Department of Defense Cloud Computing Security Requirements Guide.
  • Take ownership of issues discovered during security control and risk assessments by creating and managing plans of action and milestones (POA&M).  
  • In collaboration with the Facility Security Officer (FSO), implement and continuously monitor DoD procedures for classified document control, visitor control, personnel security, and physical security.
  • Direct security measures necessary for implementing applicable security requirements of the NISPOM related Federal requirements.
  • Manage and control changes to the system and assessing the security impact of those changes.
  • Advise and inform the appropriate System Owner, Authorizing Official, and GPS management regarding issues or concerns regarding GPS information systems. 
  • Investigate and document risks associated with information systems for management review and acceptance. 
  • Support Authorizing Officials with their risk-based decision process by preparing appropriate system and risk documentation. 
  • Participate in the management of information security risks at the system and program levels. 


Skills and attributes for success 


  • Application security and cloud security experience.
  • Ability to learn, understand, and demonstrate Agile methodology.
  • Ability to speak to a client as well as an assessor about security control implementation.
  • Able to be flexible with timelines and priorities
  • Ability to give guidance to newer security staff
  • Ability to organize, structure and prioritize information from various sources 
  • Ability to appropriately balance needs of GPS Information Security with business and technological risks and business impact 
  • Ability to think creatively while accounting for multiple perspectives in any given scenario 
  • Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change 
  • Ability to work independently and with minimal direct supervision 
  • Focused on how to best convey information clearly and concisely 
  • Experience working in information security and understanding of information security concepts including technical, administrative, or managerial controls.  
  • Knowledge of information security policies / principles of handling and protecting information 
  • In-depth understanding of NIST security documentation such as FIPS and 800 Series publications and their application.  
  • General technical knowledge of operating systems, databases, networks, mobile technologies, and cloud services 
  • Strong English language skills are required – written and verbal 
  • Good writing, presentation, interpersonal, and collaborative skills 
  • Skilled in executive level presentations and briefings 
  • Experience managing communication with internal customers 
  • Ability to collaborate with others to facilitate and enhance compliance with policies 
  • Maintain awareness of the current security threat landscape 
  • Experience with coordinating tasks, allocating resources, and following tasks and projects through completion 
  • High degree of cultural and emotional intelligence, and demonstrated aptitude for resilience, flexibility, and ability to adapt to changing circumstances and dynamics 
  • Experience with Microsoft Office, GRC tools, and vulnerability scanning tools. 


To qualify for the role, you must have   


  • Degree in Information Assurance, Computer Science, or a similar technical field or equivalent work experience 
  • A current/active U.S. Top Secret Security Clearance
  • Working experience in a cloud environment (Classified or lower)
  • Must hold a CISSP, CISM, or CCISO certification in accordance with DoD 8570/8144compliance with Information Assurance Management (IAM) Level III
  • Experience and familiarity with NIST frameworks (NIST SP 800-37, NIST SP 800-53, NIST SP 800-171)
  • Demonstrated experience creating system security plans.  
  • Minimum of 5 years of Industrial Security experience
  • Full understanding of the National Industrial Security Program Operating Manual (NISPOM) and Defense Counterintelligence and  Security Agency Assessment and Authorization Process Manual (DAAPM)
  • Working knowledge with physical construction of Special Access Program Facilities (SAPFs) and/or Sensitive Compartmented Information Facilities (SCIFs); ICD-705 knowledge
  • Physical/Technical Security and Document Control


Ideally, you’ll also have experience 


  • Interpreting, implementing, and assessing DISA STIG results.
  • Managing cybersecurity incident response and incident handling.
  • Working with people with different levels of technical knowledge and expertise 
  • Working in Azure and Cloud Computing environments
  • Creating and maintaining appropriate measures for an information security program in a highly audited environment 
  • Excellent computer skills with ability to draft/implement Standard Operating Procedures (SOPs)
  • Evaluating and documenting information security risks and issues in both a qualitative and quantitative manner 
  • Planning and managing information security remediation efforts 


What we look for  


Individuals with strong business and technical acumen who demonstrate drive, vision, teaming and purpose and are passionate about helping our clients achieve their goals.  

  What we offer   We offer a comprehensive compensation and benefits package where you’ll be rewarded based on your performance and recognized for the value you bring to the business.  The salary range for this job in most geographic locations in the US is $126,800 to $230,100. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $152,200 to $261,500.  Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography.  In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.  
  • Continuous learning: You’ll develop the mindset and skills to navigate whatever comes next.
  • Success as defined by you: We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
  • Transformative leadership: We’ll give you the insights, coaching and confidence to be the leader the world needs.
  • Diverse and inclusive culture: You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
  If you can demonstrate that you meet the criteria above, please contact us as soon as possible.   The exceptional EY experience. It’s yours to build. EY | Building a better working world   EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.   Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.   Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.   EY is an equal opportunity, affirmative action employer providing equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.   EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, type Option 2 (HR-related inquiries) and then type Option 1 (HR Shared Services Center), which will route you to EY’s Talent Shared Services Team or email SSC Customer Support at
Apply now Apply later
  • Share this job via
  • or

Tags: Agile Application security Azure CISM CISSP Clearance Cloud CMMC Compliance Computer Science DAAPM DISA DoD DoDD 8570 IAM Incident response Industrial Monitoring NISPOM NIST NIST 800-53 NIST Frameworks POA&M Risk assessment Risk management Security Clearance Strategy System Security Plan Top Secret

Perks/benefits: Career development Flex hours Flex vacation Health care Startup environment

Region: North America
Country: United States
Job stats:  1  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.