The Information System Security Officer (ISSO) position will function as an integral member of the ICAM program team. Overall, the ICAM team is responsible to provide assessment, planning, designing, development, deployment, training, and transition to operations activities related to maturing the USAID’s ICAM infrastructure, capabilities, and service offerings utilized by USAID’s Bureaus and external partners.  In this role, the ISSO provides security management oversight to all ICAM activities occurring within the program scope.  The role is expected to have interaction and coordination with the USAID IA group to ensure compliant, certified solutions are developed and implemented. 

Activities may include correlation of threat data from various sources to establish the identity and modus operandi of hackers active in client's networks and posing a potential threat. Provides the customer with assessments and reports facilitating situational awareness and understanding of current cyber threats and adversaries. Develops cyber threat profiles based on geographic region, country, group, or individual actors. Produces cyber threat assessments based on entity threat analysis. May provide computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments. Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.

 Examples of work activity:

  • Collaborates with intrusion analysts to identify, report on, and coordinate remediation of cyberthreats to the client.
  • Provides timely and actionable sanitized intelligence to cyber incident response professionals.
  • Leverages technical knowledge of computer systems and networks with cyber threat information to assess the client's security posture.
  • Conducts intelligence analysis to assess intrusion signatures, tactics, techniques and procedures associated with preparation for and execution of cyber attacks.
  • Researches hackers, hacker techniques, vulnerabilities, exploits, and provides detailed briefings and intelligence reports to leadership.

Required Skills and Experience

  • Bachelor's with 8+ years (or commensurate experience)
  • Zero Trust Architecture
  • Familiarity with ICAM standard and mandates (NIST 800-63-3, FIPS 201-2, etc.)
  • NextGen Firewalls, specifically Palo Alto
  • Encryption and PKI
  • Dynamic Access Control / Identity Management
  • Azure AD
  • Splunk (or other SIEMs including ELK and Google Chronicle)
  • Cisco Network Security (including Cisco Tetration, Cisco ISE)
  • AWS / Azure security function (e.g., Azure Security Center)
  • Endpoint Device Health and Forensics
  • CDM (all phases)

Preferred Skills and Experience

  • Understanding of federal ISSO process
  • 5-10 years of Identity and Network security design and implementation
  • Understanding of Trusted Internet Connection version 3 standards and migration path
  • 2-5 years of Cloud Access Security Broker (CASB) experience
  • Combination of Security +, CCSP, CCNP Security, AWS/Azure Security or similar certifications a plus

COVID Policy: New employees will be required to adhere to the Company's and its clients' COVID-19 safety procedures. In the event that the COVID-19 vaccination mandate for Federal Contractors is enforced, you must become fully vaccinated or request and be approved for an exemption. Employees working onsite at a client location must comply with our client's COVID-19 requirements.

GovCIO is a team of professionals who want to make a difference. And that can only happen with a diverse, happy, and cared-for team. So, we prioritize your well-being, equity for all and look for ways to make work a better place for each of us every day.

We are an Equal Opportunity Employer. All qualified applicants receive consideration for employment without regard to race, ethnicity, religious affiliation, gender, gender identity or expression, sexual orientation, national origin, or disability status. EOE AA M/ F/Vet/Disabled


GovernmentCIO (GovCIO) has a single goal: to be the preeminent source for new ideas in government IT transformation. We continue to grow rapidly, aligning our broad-ranging technology and business expertise to help Federal leaders confront their most pressing challenges.

Our founder focused on two key principles: delivering excellence and always putting the client's needs first. GCIO's consulting work began at the Department of Labor and has since grown to provide an array of work across the Federal space, most notably, at the Department of Veterans Affairs.

Using Agile and Human-Centered foundations, we collaborate with customers to implement innovative and groundbreaking IT modernization, analytics, cyber-security, and digital solutions, as well as experience-based strategic management and advisory support. Our teams comprise industry, military, and government veterans who close the gaps in process, communication, productivity, and security. Our teams comprise industry, military, and government veterans who close the gaps in process, communication, productivity, and security.