LOG IN
SIGN UP
Tech Job Finder - Find Software, Technology Sales and Product Manager Jobs.
Sign In
OR continue with e-mail and password
E-mail address
Password
Don't have an account?
Reset password
Join Tech Job Finder
OR continue with e-mail and password
E-mail address
First name
Last name
Username
Password
Confirm Password
How did you hear about us?
By signing up, you agree to our Terms & Conditions and Privacy Policy.

Information System Security Officer

at Deloitte

Back to all Cybersecurity jobs
Deloitte logo
Big Four

Information System Security Officer

at Deloitte

Mid LevelNo visa sponsorshipCybersecurity

Posted 5 days ago

No clicks

Compensation
Not specified USD

Currency: $ (USD)

City
Not specified
Country
United States

Join Deloitte's Cyber team as an Information System Security Officer to support ISSO functions within the RMF framework. You will help create and track security controls, POA&Ms, and key security artifacts such as SSPs, Security Assessment Reports, and incident response plans. The role requires at least 4 years of hands-on information security experience, cloud skills, and ability to obtain a Public Trust clearance, with up to 15% travel. You will work with Deloitte's GPS practice serving federal, state, and local government clients.

Information System Security Officer

Engineering and Product | Security Engineering
Same job available in 2 locations

Arlington/Rosslyn, Virginia, United States

McLean, Virginia, United States

Position Summary

Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.

Work You’ll Do

  • Seeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).
  • Candidates must be experienced and capable of assisting ISSO’s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.

The Team

Deloitte’s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes—are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.

Qualifications

Required:

  • Bachelor’s degree required.
  • Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.
  • Ability to obtain a Public Trust clearance
  • Ability to travel up to 15% on average
  • At least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.
  • Intermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.
  • Strong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.
  • Experience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).
  • Proficient technical writing for a variety of security documentation, including:
    • System Security Plans (SSP)
    • Security Assessment Reports
    • Contingency Plans
    • Incident Response Plans
    • Policies, procedures, and executive summaries
    • Interconnection Security Agreements (ISA)
  • Skilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.

Preferred:

  • At least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.

Information for applicants with a need for accommodation: https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disable

Deloitte is committed to providing reasonable accommodations for people with disabilities. If you require a reasonable accommodation to participate in the recruiting process, please direct your inquiries to the Global Call Center (GCC) at USTalentCICInbox@deloitte.com.
Recruiting tips

From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits

At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture

Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ways of thinking, ideas, and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. 
Our purpose

Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities.  Learn more.
Professional development

From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Requisition code: 320624
Job ID 320624
tpt.queue.add( function () { "use strict"; (function ($) { jQuery.get( "https://apply.deloitte.com/en_US/careers/RelatedJobs?3_149_3=637&3_370_3=112873319&3_200_3=95157&jobId=320624", function (data) { if (data.trim() == "" && jQuery(".article--relatedJobs").length) { jQuery(".article--relatedJobs").addClass("visibility--hidden"); } jQuery('#relatedJobs').append(data).removeClass('awaiting-content'); tpt.queue.next(); } ); }($ || avajQuery)); } );

Similar jobs

SCAM ALERT

Caution against fraudulent job offers!

We have been informed of instances where jobseekers are led to believe of fictitious job opportunities with Deloitte US (“Deloitte”). In one or more such cases, false promises of actual or potential selection, or initiation or completion of the recruitment formalities appear to have been or are being made. Some jobseekers appear to have been asked to pay money to specified bank accounts of individuals or entities as a condition of their selection for a ‘job’ with Deloitte. These individuals or entities are in no way connected with Deloitte and do not represent or otherwise act on behalf of Deloitte.

We would like to clarify that:

  • At Deloitte, ethics and integrity are fundamental and not negotiable.
  • We are against corruption and neither offer bribes nor accept them, nor induce or permit any other party to make or receive bribes on our behalf.
  • We have not authorized any party or person to collect any money from jobseekers in any form whatsoever for promises of getting jobs in Deloitte.
  • We consider candidates on merit and that we provide an equal opportunity to eligible applicants.
  • No one other than designated Deloitte personnel (e.g., a Deloitte recruiter or Deloitte hiring partner) is permitted to extend any job offer from Deloitte.

Anyone who at any time has made or makes any payment to any party in exchange for promises of job or selection for a job with Deloitte or any matter related to this (including those for ‘registration’, ‘verification’ or ‘security deposit’) or otherwise engages with any such person who has made or makes fraudulent promises or offers, does so (or has done so) entirely at their own risk. Deloitte takes no responsibility or liability for any such unauthorized or fraudulent actions or engagements. We encourage jobseekers to exercise caution.

{ "@context": "http://schema.org", "@type": "JobPosting", "datePosted": "2025-06-18", "description": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "employmentType": [""], "hiringOrganization" : { "@type": "Organization", "name": "Deloitte US", "sameAs": null }, "identifier": { "name": 320624, "value": 320624, "@type": "PropertyValue" }, "jobLocation" : { "@type": "Place", "address": { "streetAddress": "", "addressLocality": "", "addressRegion": null, "postalCode": "", "addressCountry": null, "@type": "PostalAddress" } }, "educationRequirements": "Bachelor's Degree", "experienceRequirements": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "industry": "", "occupationalCategory": "", "qualifications": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "responsibilities": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "skills": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "specialCommitments": "Yes", "validThrough" : "2026-03-13", "title" : "US E-GPS Consultative Services- ISSO, PDM Senior Analyst- CS&T- 589273 (LL)" }

© 2026. See Terms of Use for more information.

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms.

Information System Security Officer

at Deloitte

Back to all Cybersecurity jobs
Deloitte logo
Big Four

Information System Security Officer

at Deloitte

Mid LevelNo visa sponsorshipCybersecurity

Posted 5 days ago

No clicks

Compensation
Not specified USD

Currency: $ (USD)

City
Not specified
Country
United States

Join Deloitte's Cyber team as an Information System Security Officer to support ISSO functions within the RMF framework. You will help create and track security controls, POA&Ms, and key security artifacts such as SSPs, Security Assessment Reports, and incident response plans. The role requires at least 4 years of hands-on information security experience, cloud skills, and ability to obtain a Public Trust clearance, with up to 15% travel. You will work with Deloitte's GPS practice serving federal, state, and local government clients.

Information System Security Officer

Engineering and Product | Security Engineering
Same job available in 2 locations

Arlington/Rosslyn, Virginia, United States

McLean, Virginia, United States

Position Summary

Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.

Work You’ll Do

  • Seeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).
  • Candidates must be experienced and capable of assisting ISSO’s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.

The Team

Deloitte’s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes—are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.

Qualifications

Required:

  • Bachelor’s degree required.
  • Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.
  • Ability to obtain a Public Trust clearance
  • Ability to travel up to 15% on average
  • At least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.
  • Intermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.
  • Strong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.
  • Experience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).
  • Proficient technical writing for a variety of security documentation, including:
    • System Security Plans (SSP)
    • Security Assessment Reports
    • Contingency Plans
    • Incident Response Plans
    • Policies, procedures, and executive summaries
    • Interconnection Security Agreements (ISA)
  • Skilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.

Preferred:

  • At least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.

Information for applicants with a need for accommodation: https://www2.deloitte.com/us/en/pages/careers/articles/join-deloitte-assistance-for-disable

Deloitte is committed to providing reasonable accommodations for people with disabilities. If you require a reasonable accommodation to participate in the recruiting process, please direct your inquiries to the Global Call Center (GCC) at USTalentCICInbox@deloitte.com.
Recruiting tips

From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters.
Benefits

At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you.
Our people and culture

Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ways of thinking, ideas, and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. 
Our purpose

Deloitte’s purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities.  Learn more.
Professional development

From entry-level employees to senior leaders, we believe there’s always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career.
As used in this posting, "Deloitte" means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Requisition code: 320624
Job ID 320624
tpt.queue.add( function () { "use strict"; (function ($) { jQuery.get( "https://apply.deloitte.com/en_US/careers/RelatedJobs?3_149_3=637&3_370_3=112873319&3_200_3=95157&jobId=320624", function (data) { if (data.trim() == "" && jQuery(".article--relatedJobs").length) { jQuery(".article--relatedJobs").addClass("visibility--hidden"); } jQuery('#relatedJobs').append(data).removeClass('awaiting-content'); tpt.queue.next(); } ); }($ || avajQuery)); } );

Similar jobs

SCAM ALERT

Caution against fraudulent job offers!

We have been informed of instances where jobseekers are led to believe of fictitious job opportunities with Deloitte US (“Deloitte”). In one or more such cases, false promises of actual or potential selection, or initiation or completion of the recruitment formalities appear to have been or are being made. Some jobseekers appear to have been asked to pay money to specified bank accounts of individuals or entities as a condition of their selection for a ‘job’ with Deloitte. These individuals or entities are in no way connected with Deloitte and do not represent or otherwise act on behalf of Deloitte.

We would like to clarify that:

  • At Deloitte, ethics and integrity are fundamental and not negotiable.
  • We are against corruption and neither offer bribes nor accept them, nor induce or permit any other party to make or receive bribes on our behalf.
  • We have not authorized any party or person to collect any money from jobseekers in any form whatsoever for promises of getting jobs in Deloitte.
  • We consider candidates on merit and that we provide an equal opportunity to eligible applicants.
  • No one other than designated Deloitte personnel (e.g., a Deloitte recruiter or Deloitte hiring partner) is permitted to extend any job offer from Deloitte.

Anyone who at any time has made or makes any payment to any party in exchange for promises of job or selection for a job with Deloitte or any matter related to this (including those for ‘registration’, ‘verification’ or ‘security deposit’) or otherwise engages with any such person who has made or makes fraudulent promises or offers, does so (or has done so) entirely at their own risk. Deloitte takes no responsibility or liability for any such unauthorized or fraudulent actions or engagements. We encourage jobseekers to exercise caution.

{ "@context": "http://schema.org", "@type": "JobPosting", "datePosted": "2025-06-18", "description": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "employmentType": [""], "hiringOrganization" : { "@type": "Organization", "name": "Deloitte US", "sameAs": null }, "identifier": { "name": 320624, "value": 320624, "@type": "PropertyValue" }, "jobLocation" : { "@type": "Place", "address": { "streetAddress": "", "addressLocality": "", "addressRegion": null, "postalCode": "", "addressCountry": null, "@type": "PostalAddress" } }, "educationRequirements": "Bachelor's Degree", "experienceRequirements": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "industry": "", "occupationalCategory": "", "qualifications": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "responsibilities": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "skills": "\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/p\u003E\u003Cdiv style=\"display: inline;\"\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EOur Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EWork You\u2019ll Do\u003C\/strong\u003E\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003ESeeking an information security professional to support in ISSO functions inclusive of all efforts associated with the Risk Management Framework (RMF).\u003C\/li\u003E\u003Cli\u003ECandidates must be experienced and capable of assisting ISSO\u2019s in creating security risk profiles for systems and components to provide applicable security controls with implementation descriptions; Creating and tracking and managing Plan of Actions and Milestones (POA&Ms) in CSAM; Performing Security Impact Analysis (SIA); Creating documents: such as System Security Plan (SSP), Security Assessment Report, Contingency Planning, Incident Response Plan, policies, procedures, Executive summary, Interconnection Security Agreements (ISA) as part of information security continuous monitoring process.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cstrong\u003EThe Team\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003EDeloitte\u2019s Government and Public Services (GPS) practice - our people, ideas, technology, and outcomes\u2014are designed for impact. Serving federal, state, & local government clients as well as public higher education institutions, our team of professionals brings fresh perspective to help clients anticipate disruption, reimagine the possible, and fulfill their mission promise.\u003Cbr\u003E\u003Cbr\u003E\u003Cstrong\u003EQualifications\u003C\/strong\u003E\u003Cbr\u003E\u003Cbr\u003ERequired:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EBachelor\u2019s degree required.\u003C\/li\u003E\u003Cli\u003EMust be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future.\u003C\/li\u003E\u003Cli\u003EAbility to obtain a Public Trust clearance\u003C\/li\u003E\u003Cli\u003EAbility to travel up to 15% on average\u003C\/li\u003E\u003Cli\u003EAt least 4 years of hands-on information security experience, with a focus on supporting and implementing the Risk Management Framework (RMF), developing security controls, and producing security documentation.\u003C\/li\u003E\u003Cli\u003EIntermediate expertise in security architecture and engineering, especially with cloud-based technologies (e.g., AWS, Microsoft Cloud Solutions, Pega, Acquia, SailPoint, Okta), including FEDRAMP package analysis.\u003C\/li\u003E\u003Cli\u003EStrong working knowledge of NIST Special Publications (including 800-37, 800-53 Rev. 5, 800-18, and 800-30) to support RMF processes and requirements.\u003C\/li\u003E\u003Cli\u003EExperience supporting Information System Security Officer (ISSO) functions and performing Security Impact Analysis (SIA).\u003C\/li\u003E\u003Cli\u003EProficient technical writing for a variety of security documentation, including:\u003Cul\u003E\u003Cli\u003ESystem Security Plans (SSP)\u003C\/li\u003E\u003Cli\u003ESecurity Assessment Reports\u003C\/li\u003E\u003Cli\u003EContingency Plans\u003C\/li\u003E\u003Cli\u003EIncident Response Plans\u003C\/li\u003E\u003Cli\u003EPolicies, procedures, and executive summaries\u003C\/li\u003E\u003Cli\u003EInterconnection Security Agreements (ISA)\u003C\/li\u003E\u003C\/ul\u003E\u003C\/li\u003E\u003Cli\u003ESkilled in tracking and managing Plan of Actions and Milestones (POA&Ms) using Cyber Security Assessment and Management (CSAM) tools.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EPreferred:\u003C\/p\u003E\u003Cul style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003Cli\u003EAt least one completed professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.\u003C\/li\u003E\u003C\/ul\u003E\u003Cp style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003EInformation for applicants with a need for accommodation: \u003Ca href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\" data-mce-href=\"https:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disabled-applicants.html\"\u003Ehttps:\/\/www2.deloitte.com\/us\/en\/pages\/careers\/articles\/join-deloitte-assistance-for-disable\u003C\/a\u003E\u003C\/p\u003E\u003C\/div\u003E\u003Cdiv style=\"font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 11px;\"\u003E\u003C\/div\u003E", "specialCommitments": "Yes", "validThrough" : "2026-03-13", "title" : "US E-GPS Consultative Services- ISSO, PDM Senior Analyst- CS&T- 589273 (LL)" }

© 2026. See Terms of Use for more information.

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ("DTTL"), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. In the United States, Deloitte refers to one or more of the US member firms of DTTL, their related entities that operate using the "Deloitte" name in the United States and their respective affiliates. Certain services may not be available to attest clients under the rules and regulations of public accounting. Please see www.deloitte.com/about to learn more about our global network of member firms.