SAP NS2 Intel Cloud Security and Information Systems Security Officer (ISSO) Onsite-TS/SCI/ poly req
Role details
Job location
Tech stack
Job description
SAP is the global market leader for business software and related services. SAP National Security Services Inc. (SAP NS2) is an independent U.S. subsidiary of SAP. At SAP NS2, we leverage best-in-breed technologies engineered by SAP to protect the lives, assets and information of Americans . We offer SAP solutions with specialized levels of security and support to meet the requirements of U.S. national security and critical infrastructure customers.
- U.S. citizenship and an active TS/SCI with polygraph are required.
- This position requires access to customer data; Must be a U.S. citizen. SAP NS2 does not offer Visa sponsorship for this role. All internals must have manager's approval to transfer., The SAP NS2 Cloud Security and Information Systems Security Officer (ISSO) Consultant maintains the cybersecurity posture, regulatory compliance, and continuous authorization of SAP S/4HANA systems and supporting services hosted in AWS GovCloud and SAP NS2 Private Cloud Environments (PCE). This role partners with government cybersecurity officials, cloud architects, infrastructure engineers, and SAP Basis teams to ensure compliance with DoD RMF, NIST SP 800-53 Rev. 5, FedRAMP High, IL5/IL6, and Intelligence Community (IC) requirements. The ideal candidate is a hands-on cloud security professional who independently identifies risk, drives remediation, and clearly communicates security posture, vulnerabilities, and recommendations to both technical and non-technical stakeholders., * Maintain RMF authorization packages for SAP S/4HANA, SAP Business Technology Platform (BTP), and supporting AWS services.
- Develop and maintain ATO artifacts, including SSPs, BoE, POA&Ms, waivers, exceptions, and continuous monitoring documentation.
- Enforce compliance with NIST SP 800-53 Rev. 5 and applicable DoD SRG overlays for IL5 and IL6 environments.
- Identify security vulnerabilities, assess risk, and coordinate remediation and mitigation activities with engineering and operations teams.
- Execute and oversee vulnerability and compliance scanning; analyze results and track remediation to closure.
- Manage continuous monitoring activities, including artifact collection, anomaly analysis, and security reporting.
- Review and analyze security logs from AWS, SAP, and operating systems (e.g., CloudTrail, GuardDuty, SAP audit logs).
- Track and manage POA&M remediation efforts and support incident response and change management processes.
- Enforce least privilege and segregation-of-duties (SoD) across SAP roles and AWS IAM configurations.
- Serve as the primary security liaison with Authorizing Officials (AO/AODR) and government stakeholders.
- Document system boundaries, data flows, and system interconnections., Compensation Range Transparency : SAP believes the value of pay transparency contributes towards an honest and supportive culture and is a significant step toward demonstrating SAP's commitment to pay equity. SAP provides the annualized compensation range inclusive of base salary and variable incentive target for the career level applicable to the posted role. The targeted combined range for this position is 164700 - 374200(USD) USD. The actual amount to be offered to the successful candidate will be within that range, dependent upon the key aspects of each case which may include education, skills, experience, scope of the role, location, etc. as determined through the selection process. Any SAP variable incentive includes a targeted dollar amount and any actual payout amount is dependent on company and personal performance. Please reference this link for a summary of SAP benefits and eligibility requirements: SAP North America Benefits (https://www.sapnorthamericabenefits.com/en/public/welcome) .
AI Usage in the Recruitment Process
For information on the responsible use of AI in our recruitment process, please refer to our Guidelines for Ethical Usage of AI in the Recruiting Process (https://jobs.sap.com/content/Ethical_usage_of_AI_in_the_recruiting_process/?locale=en_US) .
Please note that any violation of these guidelines may result in disqualification from the hiring process.
Requirements
- Hands-on experience implementing cloud security controls, policies, and procedures.
- Proficiency managing AWS IAM roles, policies, and permissions using least-privilege principles.
- Experience securing workloads in AWS GovCloud, including EC2, RDS, S3, IAM, CloudTrail, AWS Config, and Security Hub.
- Working knowledge of SAP S/4HANA architecture, SAP Basis concepts, and SoD controls.
- Experience conducting vulnerability management using tools such as Tenable and Splunk (or equivalent SIEM platforms).
- Strong written and verbal communication skills with demonstrated experience producing audit-ready security documentation.
- Ability to monitor, investigate, mitigate, and report cloud security incidents and vulnerabilities.
- Experience executing RMF processes from system onboarding through ATO and continuous monitoring.
- Understanding of enterprise security technologies, including firewalls, IDS/IPS, vulnerability scanners, and log analysis tools.
- Knowledge of NIST, SOX, IT General Controls (ITGC), and compliance-driven security requirements.
- Possession of, or ability to obtain within 6 months, a DoD 8570-compliant certification (e.g., CISSP, CASP , CISM, CAP).
Desired Experience and Skills
- Experience securing SAP workloads in AWS for DoD, DHS, or IC customers.
- Experience implementing security automation and compliance-as-code (e.g., AWS Config, Terraform).
- Working knowledge of Windows and Linux system hardening and secure configuration.
- Knowledge of SAP HANA database security principles.
- Experience supporting disconnected or air-gapped cloud environments.
- Familiarity with SAP Business Technology Platform (BTP).
- AWS, Linux, Windows, cloud, or systems administration certifications.
Additional Requirements
- Strong documentation discipline and attention to detail.
- Analytical, risk-based problem-solving skills.
- Ability to manage priorities and operate effectively in a mission-driven environment.
- Collaborative, stakeholder-focused mindset.
- Professional, ethical, and accountable work style.
Bachelor's degree required, preferably in Computer Science, Cybersecurity, Information Security, Engineering, or Information Technology. A combination of equivalent work and life experience will be accepted in lieu of degree
- Note: The job description is meant to be a guideline. It is not exhaustive, and we will expect the selected candidate to show flexibility and eagerness to undertake varied tasks and projects.