nInformation System Security Officer (ISSO) Chief Technology Officer

Nabout Leidos
6 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Senior
Compensation
$ 237K

Job location

Tech stack

Artificial Intelligence
Amazon Web Services (AWS)
Systems Engineering
Azure
Cloud Computing
Cloud Computing Security
Computer Security
Information Systems
Information Management
Information Systems Security Architecture Professional
Google Cloud Platform
Information Technology
Machine Learning Operations

Requirements

  • Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or related discipline (Master's preferred).\n
  • 12+ years of IT/cybersecurity experience (or 6+ years with a Master's).\n
  • 5+ years as an ISSO supporting major federal information systems/applications.\n
  • Strong systems engineering foundation with proven cloud computing expertise (AWS, Azure, GCP, or equivalent).\n
  • Hands-on experience with AI/ML tools for cybersecurity, such as anomaly detection, automated risk scoring, or AI-driven SOC platforms.\n
  • Working knowledge of auditing security controls, risk management, and compliance reporting.\n
  • Superior writing, communication, and critical analysis skills.\n
  • Deep understanding of Information Assurance, Information Management, and NIST Risk Management Framework (RMF).\n
  • Preferred Qualifications:\n
  • ISC2 Certified Information Systems Security Professional (CISSP)\n
  • ISC2 Certified in Governance, Risk and Compliance (CGRC)\n
  • ISACA Certified Information Security Manager (CISM)\n
  • CompTIA Certified Advanced Security Practitioner (CASP+)\n
  • Cloud certifications (AWS Certified Security, Azure Security Engineer Associate, Google Professional Cloud Security Engineer).\n
  • Experience designing/assessing AI governance frameworks, bias/risk mitigation, and secure AI model deployment.\n

Benefits & conditions

n \nUnleash Your Potential\n \n At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customer's success. We empower our teams, contribute to our communities, and operate sustainably. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business. \n \n \nIf this sounds like an environment where you can thrive, keep reading! \n \n \nThe Mission\n \n Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC), is a U.S. Government program responsible for preventing, identifying, containing, and eradicating cyber threats to CBP networks. The SOC safeguards enterprise-wide information systems-including LAN/WAN, cloud, commercial Internet connections, public-facing websites, mobile/cellular networks, servers, and workstations-through continuous monitoring, intrusion detection, and advanced security services. Leidos is seeking a \nInformation System Security Officer (ISSO) Chief Technology Officer.\n \n The \nISSO CTO plays a critical role in ensuring security compliance, system resilience, and secure modernization of infrastructure and applications. This position requires deep technical expertise in systems engineering, cloud computing, and artificial intelligence (AI) technologies, combined with extensive governance, risk and compliance experience.\n \n \nPrimary Tasks:\n \n \n

  • Provide cybersecurity oversight for major CBP applications and general support systems.\n
  • Apply ISSO expertise across hybrid enterprise environments, including cloud-native platforms (AWS, Azure, Google Cloud Platform), containerized workloads, and virtualized infrastructure.\n
  • Integrate AI/ML-driven security tools (threat detection, anomaly detection, behavioral analytics, predictive risk modeling) into security operations and compliance frameworks.\n
  • Develop, draft, review and endorse all information systems security plans and other security authorization artifacts and documents such as:\n
  • Standards for Security Categorization of Federal Information and Information Systems (FIPS 199) Assessment\n
  • E-Authentication Determination\n
  • Privacy Threshold Analysis (PTA)\n
  • Privacy Impact Assessment (PIA)\n
  • Risk Assessment Plan \n
  • System Security Plan (SSP) \n
  • Configuration Management Plan \n
  • Contingency Plan \n
  • Contingency Plan Test and Test Results\n
  • Section 508 of the Rehabilitation Act Plan\n
  • Plan of Action & Milestones (POA&Ms) Policy waiver and Risk Acceptance request\n
  • Ensure that assigned systems are operated, maintained, and disposed of in accordance with applicable policies and procedures NIST SP 800-37, Rev 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, DHS 4300A Policy and Handbook, CBP Information Systems Security Policies and Procedures Handbook (HB 1400-05D), and internal CBP (i.e., Office of Information Technology, Security Operations Division, etc.) security policies and practices \n
  • Develop, review, maintain, and provide system security documentation for assigned systems, including System Security Plans, Interconnection Security Agreements, Contingency Plans, Plans of Action and Milestones, (POA&M), Waivers, and Exceptions through the DHS FISMA system management tool in use to implement and manage the NIST Risk Management Framework. \n
  • Complete all activities required by the DHS Ongoing Authorization (OA) Program to transition assigned systems into the DHS OA Program and perform all required actions to maintain system authorization under OA once the system is admitted to the Program \n
  • Assist the Government with the reporting and management of system level security violations and incidents.\n
  • Assist the Government with the technical security evaluation of threats and vulnerabilities involving new/enhanced technology. \n
  • Assist the Government with providing oversight to vulnerability scanning processes and procedures. \u2022 Assist the Government with providing oversight to security patch management/flaw remediation processes and procedures.\n
  • Assist with the development of cyber security SOPs, playbooks, work instructions, and other procedures and processes to mature cyber security capabilities. \u2022 With consideration for cloud security architectures and AI-enabled systems.\n
  • Ensure cloud-based systems and AI applications align with Zero Trust principles and CBP policy.\n
  • Lead technical security evaluations of threats, vulnerabilities, and risks specific to cloud workloads and AI-driven technologies.\n
  • Oversee vulnerability scanning, patch management, and flaw remediation across hybrid and AI-enabled infrastructures.\n
  • Support the development of cybersecurity SOPs, playbooks, and AI/automation-enhanced workflows to mature SOC capabilities.\n

Apply for this position