Tetrad Digital Integrity (TDI) is a leading-edge cybersecurity firm with a mission to safeguard and protect our customers from increasing threats and vulnerabilities in this digital age. The ISSO plays a critical role in ensuring security compliance, system resilience, and secure modernization of infrastructure and applications.
Requirements
- Provide cybersecurity oversight for major customer applications and general support systems.
- Apply ISSO expertise across hybrid enterprise environments, including cloud-native platforms (AWS, Azure, Google Cloud Platform), containerized workloads, and virtualized infrastructure.
- Integrate AI/ML-driven security tools (threat detection, anomaly detection, behavioral analytics, predictive risk modeling) into security operations and compliance frameworks.
- Develop, draft, review and endorse all information systems security plans and other security authorization artifacts and documents such as: Standards for Security Categorization of Federal Information and Information Systems (FIPS 199) Assessment, E-Authentication Determination, Privacy Threshold Analysis (PTA), Privacy Impact Assessment (PIA), Risk Assessment Plan, System Security Plan (SSP) and Configuration Management Plan and Section 508 of the Rehabilitation Act Plan
- Plan of Action & Milestones (POA&Ms) Policy waiver and Risk Acceptance request
- Ensure that assigned systems are operated, maintained, and disposed of in accordance with applicable policies and procedures NIST SP 800-37, Rev 2, Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy, DHS 4300A Policy and Handbook, CBP Information Systems Security Policies and Procedures Handbook (HB 1400-05D), and internal CBP (i.e., Office of Information Technology, Security Operations Division, etc.) security policies and practices
- Develop, review, maintain, and provide system security documentation for assigned systems, including System Security Plans, Interconnection Security Agreements, Contingency Plans, Plans of Action and Milestones, (POA&M), Waivers, and Exceptions through the DHS FISMA system management tool in use to implement and manage the NIST Risk Management Framework.
- Complete all activities required by the DHS Ongoing Authorization (OA) Program to transition assigned systems into the DHS OA Program and perform all required actions to maintain system authorization under OA once the system is admitted to the Program
- Assist the Government with the reporting and management of system level security violations and incidents and technical security evaluation of threats and vulnerabilities involving new/enhanced technology.
- Provide oversight to vulnerability scanning processes and procedures and security patch management/flaw remediation processes and procedures.
- Assist with the development of cyber security SOPs, playbooks, work instructions, and other procedures and processes to mature cyber security capabilities with consideration for cloud security architectures and AI-enabled systems.
- Ensure cloud-based systems and AI applications align with Zero Trust principles and customer policy.
- Lead technical security evaluations of threats, vulnerabilities, and risks specific to cloud workloads and AI-driven technologies.
- Support the development of cybersecurity SOPs, playbooks, and AI/automation-enhanced workflows to mature SOC capabilities.
Benefits
- Generous Paid Time Off
- 401k Matching
- Retirement Plan