Information Systems Security Engineer-rmf (isse Ii) (government)

AT&T AT&T · Telecom · Columbia, MD

Information Systems Security Engineer responsible for RMF compliance, technical security assessments, implementing and validating security controls, vulnerability management, and continuous monitoring for government systems. Requires TS/SCI clearance and experience with NIST standards and security tools.

What you'd actually do

  1. Serve as the technical security engineer for assigned systems and System Security Plans (SSPs), ensuring full lifecycle RMF compliance.
  2. Provide technical input for Authorization to Operate (ATO) packages, risk acceptance decisions, and continuous monitoring efforts.
  3. Implement and validate security controls from NIST SP 800-53 and serve as technical security liaison with technology frameworks to complete.
  4. Ensure all controls are properly mapped, implemented, and tested within the Security Control Traceability Matrix (SCTM) and respond to Security Assessment Report (SAR).
  5. Collaborate with the vulnerability scanning team (e.g., Tenable operators) to ensure scan compliance, findings are addressed, retested, and reflected accurately in the system’s risk posture.

Skills

Required

  • Fourteen (14) years’ experience as an ISSE on programs and contracts of similar scope, type, and complexity within the Federal Government
  • Bachelor’s degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline
  • Active DoD 8570 IAT Level II or III certification (e.g., Security+, CASP, CISSP, or equivalent)
  • Knowledge of servers, virtualization, routers, switches, and firewalls as well as VLANS, routing and network segmentation
  • Demonstrated experience authoring and maintaining System Security Plans (SSPs), SCTMs, and POA&Ms
  • Solid understanding of continuous monitoring, reauthorization, and configuration management processes
  • Hands-on familiarity with Tenable, Splunk, STIG Viewer, and customer security compliance management tools
  • Knowledge of Windows, Linux, and network security controls implementation

Nice to have

  • Willingness to train junior team members

What the JD emphasized

  • full lifecycle RMF compliance
  • NIST SP 800-53
  • continuous monitoring
  • vulnerability scanning team
  • system technical artifacts