Information System Security Officer
Engineering and Product | Security Engineering
Share this job: Share:
Share Caution against fraudulent job offers. Learn more.
Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
Work You’ll Do
- Seeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).
- Candidates must be experienced and capable of assisting ISSO’s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.
The Team
Deloitte’s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes—are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.
Qualifications
Required:
- Bachelor’s degree required.
- Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.
- Ability to obtain a Public Trust clearance
- Ability to travel up to 15% on average
- At least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.
- Intermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.
- Strong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.
- Experience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).
- Proficient technical writing for a variety of security documentation, including:
- System Security Plans (SSP)
- Security Assessment Reports
- Contingency Plans
- Incident Response Plans
- Policies, procedures, and executive summaries
- Interconnection Security Agreements (ISA)
- Skilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.
Preferred:
- At least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.
Information for applicants with a need for accommodation: https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disable
Deloitte is committed to providing reasonable accommodations for people with disabilities. If you require a reasonable accommodation to participate in the recruiting process, please direct your inquiries to the Global Call Center (GCC) at USTalentCICInbox@deloitte.com.
Our people and culture
Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ways of thinking, ideas, and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work.
Our purpose
Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities.
Learn more.
Professional development
From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Requisition code: 320624
Job ID 320624
tpt.queue.add( function () { "use strict"; (function ($) { jQuery.get( "https://apply.deloitte.com/en_US/careers/RelatedJobs?3_149_3=637&3_370_3=112873319&3_200_3=95157&jobId=320624", function (data) { if (data.trim() == "" && jQuery(".article--relatedJobs").length) { jQuery(".article--relatedJobs").addClass("visibility--hidden"); } jQuery('#relatedJobs').append(data).removeClass('awaiting-content'); tpt.queue.next(); } ); }($ || avajQuery)); } );
-
Honolulu, Hawaii, United States AI & Engineering
-
Incident Responder, IoT and OT (Secret Clearance Required, Onsite)
Arlington/Rosslyn, Virginia, United States Cyber
-
Sr Program Management Analyst
San Diego, California, United States AI & Engineering
-
Indianapolis, Indiana, United States Customer
-
San Francisco, California, United States Customer
Caution against fraudulent job offers!
We have been informed of instances where jobseekers are led to believe of fictitious job opportunities with Deloitte US (“Deloitte”). In one or more such cases, false promises of actual or potential selection, or initiation or completion of the recruitment formalities appear to have been or are being made. Some jobseekers appear to have been asked to pay money to specified bank accounts of individuals or entities as a condition of their selection for a ‘job’ with Deloitte. These individuals or entities are in no way connected with Deloitte and do not represent or otherwise act on behalf of Deloitte.
We would like to clarify that:
- At Deloitte, ethics and integrity are fundamental and not negotiable.
- We are against corruption and neither offer bribes nor accept them, nor induce or permit any other party to make or receive bribes on our behalf.
- We have not authorized any party or person to collect any money from jobseekers in any form whatsoever for promises of getting jobs in Deloitte.
- We consider candidates on merit and that we provide an equal opportunity to eligible applicants.
- No one other than designated Deloitte personnel (e.g., a Deloitte recruiter or Deloitte hiring partner) is permitted to extend any job offer from Deloitte.
Anyone who at any time has made or makes any payment to any party in exchange for promises of job or selection for a job with Deloitte or any matter related to this (including those for ‘registration’, ‘verification’ or ‘security deposit’) or otherwise engages with any such person who has made or makes fraudulent promises or offers, does so (or has done so) entirely at their own risk. Deloitte takes no responsibility or liability for any such unauthorized or fraudulent actions or engagements. We encourage jobseekers to exercise caution.
{ "@context": "http://schema.org", "@type": "JobPosting", "datePosted": "2025-06-18", "description": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "employmentType": [""], "hiringOrganization" : { "@type": "Organization", "name": "Deloitte US", "sameAs": null }, "identifier": { "name": 320624, "value": 320624, "@type": "PropertyValue" }, "jobLocation" : { "@type": "Place", "address": { "streetAddress": "", "addressLocality": "", "addressRegion": null, "postalCode": "", "addressCountry": null, "@type": "PostalAddress" } }, "educationRequirements": "Bachelor's Degree", "experienceRequirements": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "industry": "", "occupationalCategory": "", "qualifications": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "responsibilities": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "skills": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "specialCommitments": "Yes", "validThrough" : "2026-03-13", "title" : "US E-GPS Consultative Services- ISSO, PDM Senior Analyst- CS&T- 589273 (LL)" }