Information System Security Officer

MIT Lincoln Laboratory
Lexington, MA, US
Full-time

The Security Services Department’s overall mission is to identify and counter security threats to the MIT Lincoln Laboratory’s mission of development of game-changing technology in support of National Security, including guarding against compromise by foreign intelligence agencies and insider threats.

To accomplish this mission, this department formulates and implements policies, plans, and actions designed to protect facilities against threats of vandalism, accidental destruction, and sabotage;

and safeguards personnel, classified and unclassified information systems, personal identifiable information, property, and other assets from exploitation and recruitment by foreign intelligence agencies.

We foster a diverse and inclusive culture where security professionals from a wide range of backgrounds are empowered to solve complex security problems in close collaboration with Laboratory research teams and Government counterparts.

Our people are our most important resource, and we encourage a casual and flexible opportunity-filled working environment that is technology-focused.

Where mission needs can be met, the Security Services Department encourages flexible schedules and hybrid remote work arrangements.

Who are we?

MIT Lincoln Laboratory is a Federally Funded Research and Development Center (FFRDC) whose mission is research in support of National Security.

  • Mission - The Security Services Department’s (SSD) overall mission is to identify and counter security threats to the MIT Lincoln Laboratory’s mission of development of game-changing technology in support of national security, including guarding against compromise by foreign intelligence agencies and insider threats.
  • Culture We foster an inclusive, opportunity-filled environment of empowered team members from diverse backgrounds.

What will you do?

You will provide cybersecurity support to several independent MIT Lincoln Laboratory’s Special Programs. Core responsibilities include :

Assist and Support necessary compliance activities (e.g., ensure that cyber system security configurations guidelines are followed, compliance monitoring occurs).

Continuously validate the organization against cybersecurity policies / guidelines / procedures / regulations / laws to ensure compliance.

Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.

Promote awareness of security issues among management and ensure sound security principles are reflected in the organization's vision and goals.

Conduct continuous monitoring and track audit findings and provide countermeasure and mitigation recommendations to ensure that appropriate actions are taken to secure critical R & D data.

Recommend resource allocations required to securely operate and maintain an organization's cybersecurity requirements.

Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to key stake holders.

Recognize a possible security violation and take appropriate action to report the incident, as required.

Assist the Program Managers and the Information System Security Manager (ISSM) in the development and maintenance of System Security Plans (SSP) and associated artifacts such as the Plan of Action & Milestones (POA&M), Risk Assessment Report, and Continuous Monitoring Strategy.

Ensure systems are operated, maintained, and disposed of in accordance with organization security policies and procedures.

Provide periodic cybersecurity reviews of network, system, and application vulnerability scanning, configuration assessment, and remediation.

Lead and align information technology (IT) security priorities with the security strategy.

Prepare for and participate in periodic organization compliance assessments.

Interpret patterns of noncompliance to determine their impact on levels of risk and / or overall effectiveness of the enterprise's cybersecurity program.

How will you grow?

You will find significant opportunities to do meaningful work in an environment intentionally designed to be one where you will learn, thrive and belong.

  • Leadership : Room to advance on your team or to lead cross-functional projects.
  • Growth Opportunities : Potential for lateral and vertical movement.
  • Education / Training : Management training, mentorship, in-house and external courses.
  • Exposure : Engagement with sponsors, stakeholders, Laboratory leadership and other Departments and Divisions.
  • Community : Participation is encouraged for Laboratory social events, Employee Resource Groups (ERGs), clubs and study groups, volunteering and community service projects.

What you need / Requirements :

To work with MITLL, all employees must meet certain basic requirements.

  • The ability to obtain and maintain a Top-Secret clearance with SCI.
  • Must be a U.S. Citizen.
  • Successfully pass a background check and consent to undergoing a government polygraph examination.
  • Possess a DoD 8570.01-M IAM I baseline certification (e.g. CompTIA Security+), or be able to obtain one within 6 months of hire
  • Demonstrated experience with vulnerability scanning and auditing tools and processes is required
  • Excellent written and verbal communication skills are required
  • Technical experience, skills, and course work completed towards an undergraduate degree, or industry IT certifications may be considered in lieu of education or DoD security experience requirements
  • Demonstrated understanding of the following security frameworks is required : NIST 800-53 / Risk Management Framework (RMF) Intelligence Community Directive (ICD) 503 National Industrial Security Program Operating Manual (NISPOM) Chapter 8 DoD Manual 5205.07 Volumes 1- 4

Ideally you will have :

The Laboratory values experiences from diverse backgrounds and occupations. The most successful candidates will have the following skills and qualifications.

A minimum of 4 years of IT security experience in DoD cybersecurity is preferred

Experienced in auditing, configuration and vulnerability management

Experience and familiarity with multiple operating systems such as Windows Server 2012, 2016, 2019, and 2022 Windows 10 and 11, Red Hat Enterprise Linux, Ubuntu, Mac, etc.

Experience with virtualization and Cloud technologies is preferred

Ability to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements;

ensuring a robust software quality control process; and establishing multiple sources (e.g., delivery routes, for critical system elements).

Technical experience securing networks and systems utilizing DISA STIGs and / or SRGs is highly desired

At MIT Lincoln Laboratory, our exceptional career opportunities include many outstanding benefits to help you stay healthy, feel supported, and enjoy a fulfilling work-life balance.

Benefits offered to employees include :

  • Comprehensive health, dental, and vision plans
  • MIT-funded pension
  • Matching 401K
  • Paid leave (including vacation, sick, parental, military, etc.)
  • Tuition reimbursement and continuing education programs
  • Mentorship programs
  • A range of work-life balance options
  • and much more!

for more information. As an employee of MIT, you can also take advantage of .

30+ days ago
Related jobs
Promoted
Draper Labs
Cambridge, Massachusetts

The Information System Security Officer 1 (ISSO) supports the continuous monitoring and authorization efforts of multiple classified information systems under the direction of the Information System Security Manager (ISSM). Ensure systems are operated, maintained, and disposed of in accordance with ...

GDIT
Cambridge, Massachusetts

The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. The ISSO is responsible for ensuring the appropriate operational se...

Beacon Hill
Waltham, Massachusetts

Join our client's team as an (ISSO) Information Systems Security Officers to lead our robust Information Security (IS) program. Conducting assessments and enforcing configuration policies, you'll update our System Security Plan and manage user activity data. Ensures proper restoration of security fe...

GDIT
Waltham, Massachusetts

The Information Systems Security Officer (ISSO) III is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required ...

Global Resource Solutions
Lincoln, Massachusetts

GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Information System Security Manager II. Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integrati...

gTANGIBLE Corporation
Hanscom Air Force Base, Massachusetts

Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process. Information Systems Security Manager...

Huntington Ingalls Industries
Hanscom Air Force Base, Massachusetts

The ISSE designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (incl...

MIT Lincoln Laboratory
Lexington, Massachusetts

Supervise a team of Information System Security Officers (ISSOs). Execute in-depth computer security principles and practices in order to execute a comprehensive information security program servicing a diverse enterprise environment of ESXi, Linux, and Windows systems. Report on key cybersecurity m...

Constant Contact
Waltham, Massachusetts

As a technical and hands-on Chief Information Security Officer (CISO) reporting to the CIO, you will be responsible for establishing and executing the strategic enterprise vision and proactive program to ensure all of Constant Contacts information assets, employees, customers, and technologies are a...

Clevelcrossing
Boston, Massachusetts

Professional security management certification preferred; Certified Information Systems Security Professional (CISS), Certified Information Security Manager (CISM). Propose, review and update a set of information security documentation (information security policy, risk assessment methodology, state...