We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Information Systems Security Engineer (ISSE)

Astrion
United States, Mississippi, Biloxi
Feb 25, 2026
Overview

Information Systems Security Engineer (ISSE)

Location: Hurlburt Field, FL, JBSA, TX, and Keesler AFB, MS

Job Status: Full time

Clearance: Top Secret

Astrion has an exciting opportunity coming up for an ISSE to join our team and support the 39th Information Operations Squadron (39 IOS).

We are preparing to hire for Journeyman, Senior, and SME levels. We anticipate a start date in March/April 2026.

Cyber Operations Formal Training Support III (CyOFTSIII)is a Cyber Schoolhouse program supporting delivery, development, and sustainment of cyber training acrossoperationally relevant mission sets. The team supports instruction, curriculum and content development, training operations, and program execution at multiple Air Force and joint training locations.

REQUIRED QUALIFICATIONS / SKILLS

  • Active Top Secret clearance
  • IAT/M Level II certification

  • Education and Experience will depend on the labor category level.
    • Previous Information System Security experience is required.

RESPONSIBILITIES

  • Perform Information Systems Security Engineer duties consistent with the labor category and required RMF experience.
  • Support security architecture and security engineering activities aligned to DCWF work roles (Security Architect; Information Systems Security Developer; Cyber Defense Infrastructure Support Specialist).
  • Support security control assessment and ISSM coordination activities aligned to DCWF work roles (Security Control Assessor; Information Systems Security Manager).
  • Maintain and apply required IAT/M certification level (II or III) within the scope of assigned duties.
  • You will stay up to date on emerging technologies, exploits, vulnerabilities, and hacker techniques and provide briefings and reports to leadership.
  • You will train staff on, and oversee the use of, information security standards, policies, and best practices while performing duties outlined in national standards including, but not limited to: CNSSI 4009, NIST 800-37, and NIST 800-160.
  • You will understand system engineering and cybersecurity concepts and methodologies at the professional level with knowledge equivalent to: Certified Information Systems Security Professional, Cisco Certified Network Professional, VMWare Certified Professional, or similar certifications.
  • You will create, draft, and maintain Security Assessment and Authorization packages along with assisting and consulting in the development of information security procedures.
  • You will provide artifacts for RMF packages including, but not limited to: Security Plans, Security Assessment Reports, Security Controls Traceability Matrix, and Plan of Action and Milestones.
  • You will ensure systems comply with Cybersecurity and Information Assurance and Cybersecurity standards and best practices including, but not limited to: Endpoints, Switches, Routers, Firewalls, and Servers.
  • You will assist and consult in technical management including, but not limited to: Business/Mission Analysis, System Requirements Definitions, System Architecture, Defense in Depth, Zero Trust, Domain Separation, and Disaster Recovery.
  • You will assist/consult in technical processes including, but not limited to: Project Planning, Configuration Management, Risk Management, and Information Management.
  • You will ensure proper implementation of technical security controls and measures including, but not limited to: STIGs, AAA, VPN, Public Key Infrastructure (PKI), Identity, Credential, and Access Management (ICAM), and Security Patches.
  • You will ensure all systems are properly logging events to include but not limited to: the Security Incident and Event Monitor (SIEM) used for live monitoring and alerts.
  • You will perform system audits, vulnerability scans, and threat assessments on all networks including, but not limited to: System Analysis/Forensics and Anomaly Detection.
  • You will perform incident response activities and conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage including, but not limited to: Provide Intelligence, Provide Reports and Malware
Applied = 0

(web-54bd5f4dd9-d2dbq)